default search action
Emil C. Lupu
Person information
- affiliation: Imperial College London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Luca Maria Castiglione, Emil C. Lupu:
Which Attacks Lead to Hazards? Combining Safety and Security Analysis for Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 21(4): 2526-2540 (2024) - [j31]Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu:
Hyperparameter Learning Under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization. IEEE Trans. Neural Networks Learn. Syst. 35(11): 16008-16022 (2024) - [i29]Dovydas Joksas, Luis Muñoz-González, Emil Lupu, Adnan Mehonic:
Nonideality-aware training makes memristive networks more robust to adversarial attacks. CoRR abs/2409.19671 (2024) - 2023
- [j30]Jukka Soikkeli, Giuliano Casale, Luis Muñoz-González, Emil C. Lupu:
Redundancy Planning for Cost Efficient Resilience to Cyber Attacks. IEEE Trans. Dependable Secur. Comput. 20(2): 1154-1168 (2023) - [j29]Fulvio Valenza, Erisa Karafili, Rodrigo Vieira Steiner, Emil C. Lupu:
A Hybrid Threat Model for Smart Systems. IEEE Trans. Dependable Secur. Comput. 20(5): 4403-4417 (2023) - [i28]Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu:
Hyperparameter Learning under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization. CoRR abs/2306.01613 (2023) - [i27]Rajib Ranjan Maiti, Sridhar Adepu, Emil Lupu:
ICCPS: Impact discovery using causal inference for cyber attacks in CPSs. CoRR abs/2307.14161 (2023) - [i26]Marwa Salayma, Emil C. Lupu:
Threat Modelling in Internet of Things (IoT) Environment Using Dynamic Attack Graphs. CoRR abs/2310.01689 (2023) - 2022
- [c124]Kenneth T. Co, David Martínez-Rego, Zhongyuan Hau, Emil C. Lupu:
Jacobian Ensembles Improve Robustness Trade-Offs to Adversarial Attacks. ICANN (3) 2022: 680-691 - [c123]Luca Maria Castiglione, Zhongyuan Hau, Pudong Ge, Kenneth T. Co, Luis Muñoz-González, Fei Teng, Emil Lupu:
HA-Grid: Security Aware Hazard Analysis for Smart Grids. SmartGridComm 2022: 446-452 - [c122]Zhongyuan Hau, Soteris Demetriou, Emil C. Lupu:
Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception. SP (Workshops) 2022: 229-235 - [i25]Kenneth T. Co, David Martínez-Rego, Zhongyuan Hau, Emil C. Lupu:
Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks. CoRR abs/2204.08726 (2022) - [i24]Zhongyuan Hau, Soteris Demetriou, Emil C. Lupu:
Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception. CoRR abs/2204.13973 (2022) - 2021
- [j28]Hassan Chizari, Emil Lupu:
Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical Devices. IEEE Trans. Dependable Secur. Comput. 18(2): 875-888 (2021) - [c121]Zhongyuan Hau, Soteris Demetriou, Luis Muñoz-González, Emil C. Lupu:
Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing. ESORICS (1) 2021: 691-711 - [c120]Jukka Soikkeli, Cora Lisa Perner, Emil C. Lupu:
Analyzing the Viability of UAV Missions Facing Cyber Attacks. EuroS&P Workshops 2021: 103-112 - [c119]Kenneth T. Co, David Martínez-Rego, Emil C. Lupu:
Jacobian Regularization for Mitigating Universal Adversarial Perturbations. ICANN (4) 2021: 202-213 - [c118]Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Ben Glocker, Emil C. Lupu:
Universal Adversarial Robustness of Texture and Shape-Biased Models. ICIP 2021: 799-803 - [i23]Zhongyuan Hau, Kenneth T. Co, Soteris Demetriou, Emil C. Lupu:
Object Removal Attacks on LiDAR-based 3D Object Detectors. CoRR abs/2102.03722 (2021) - [i22]Kenneth T. Co, David Martínez-Rego, Emil C. Lupu:
Jacobian Regularization for Mitigating Universal Adversarial Perturbations. CoRR abs/2104.10459 (2021) - [i21]Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Emil C. Lupu:
Real-time Detection of Practical Universal Adversarial Perturbations. CoRR abs/2105.07334 (2021) - [i20]Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu:
Regularization Can Help Mitigate Poisoning Attacks... with the Right Hyperparameters. CoRR abs/2105.10948 (2021) - 2020
- [j27]Erisa Karafili, Linna Wang, Emil C. Lupu:
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks. Digit. Investig. 32 Supplement: 300925 (2020) - [c117]Luca Maria Castiglione, Emil C. Lupu:
Hazard Driven Threat Modelling for Cyber Physical Systems. CPSIOTSEC@CCS 2020: 13-24 - [c116]Erisa Karafili, Fulvio Valenza, Yichen Chen, Emil C. Lupu:
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning. NOMS 2020: 1-4 - [i19]Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu:
Regularisation Can Mitigate Poisoning Attacks: A Novel Analysis Based on Multiobjective Bilevel Optimisation. CoRR abs/2003.00040 (2020) - [i18]Zhongyuan Hau, Soteris Demetriou, Luis Muñoz-González, Emil C. Lupu:
GhostBuster: Looking Into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing. CoRR abs/2008.12008 (2020) - [i17]Alberto G. Matachana, Kenneth T. Co, Luis Muñoz-González, David Martínez-Rego, Emil C. Lupu:
Robustness and Transferability of Universal Attacks on Compressed Models. CoRR abs/2012.06024 (2020)
2010 – 2019
- 2019
- [j26]Rodrigo Vieira Steiner, Emil Lupu:
Towards more practical software-based attestation. Comput. Networks 149: 43-55 (2019) - [j25]Konstantina Spanaki, Zeynep Gürgüç, Catherine Mulligan, Emil Lupu:
Organizational cloud security and control: a proactive approach. Inf. Technol. People 32(3): 516-537 (2019) - [j24]Luis Munoz-Gonzalez, Daniele Sgandurra, Martín Barrère, Emil C. Lupu:
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs. IEEE Trans. Dependable Secur. Comput. 16(2): 231-244 (2019) - [c115]Jukka Soikkeli, Luis Muñoz-González, Emil Lupu:
Efficient Attack Countermeasure Selection Accounting for Recovery and Action Costs. ARES 2019: 3:1-3:10 - [c114]Kenneth T. Co, Luis Muñoz-González, Sixte de Maupeou, Emil C. Lupu:
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks. CCS 2019: 275-289 - [c113]Zhongyuan Hau, Emil C. Lupu:
Exploiting Correlations to Detect False Data Injections in Low-Density Wireless Sensor Networks. CPSS@AsiaCCS 2019: 1-12 - [c112]Greg Collinge, Emil C. Lupu, Luis Muñoz-González:
Defending against poisoning attacks in online learning settings. ESANN 2019 - [i16]Jukka Soikkeli, Luis Muñoz-González, Emil C. Lupu:
Efficient attack countermeasure selection accounting for recovery and action costs. CoRR abs/1904.03082 (2019) - [i15]Erisa Karafili, Linna Wang, Emil C. Lupu:
An Argumentation-Based Approach to Assist in the Investigation and Attribution of Cyber-Attacks. CoRR abs/1904.13173 (2019) - [i14]Kenneth T. Co, Luis Muñoz-González, Emil C. Lupu:
Sensitivity of Deep Convolutional Networks to Gabor Noise. CoRR abs/1906.03455 (2019) - [i13]Luis Muñoz-González, Bjarne Pfitzner, Matteo Russo, Javier Carnerero-Cano, Emil C. Lupu:
Poisoning Attacks with Generative Adversarial Nets. CoRR abs/1906.07773 (2019) - [i12]Luis Muñoz-González, Kenneth T. Co, Emil C. Lupu:
Byzantine-Robust Federated Machine Learning through Adaptive Model Averaging. CoRR abs/1909.05125 (2019) - [i11]Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Ben Glocker, Emil C. Lupu:
Universal Adversarial Perturbations to Understand Robustness of Texture vs. Shape-biased Training. CoRR abs/1911.10364 (2019) - 2018
- [j23]Erisa Karafili, Konstantina Spanaki, Emil C. Lupu:
An argumentation reasoning approach for data processing. Comput. Ind. 94: 52-61 (2018) - [j22]Awais Rashid, George Danezis, Howard Chivers, Emil Lupu, Andrew Martin, Makayla Lewis, Claudia Peersman:
Scoping the Cyber Security Body of Knowledge. IEEE Secur. Priv. 16(3): 96-102 (2018) - [j21]Vittorio P. Illiano, Andrea Paudice, Luis Muñoz-González, Emil C. Lupu:
Determining Resilience Gains From Anomaly Detection for Event Integrity in Wireless Sensor Networks. ACM Trans. Sens. Networks 14(1): 5:1-5:35 (2018) - [c111]Erisa Karafili, Konstantina Spanaki, Emil C. Lupu:
Access Control and Quality Attributes of Open Data: Applications and Techniques. BIS (Workshops) 2018: 603-614 - [c110]Alan Cullen, Erisa Karafili, Alan Pilgrim, Christopher Williams, Emil Lupu:
Policy Support for Autonomous Swarms of Drones. ETAA@ESORICS 2018: 56-70 - [c109]Erisa Karafili, Daniele Sgandurra, Emil Lupu:
A Logic-Based Reasoner for Discovering Authentication Vulnerabilities Between Interconnected Accounts. ETAA@ESORICS 2018: 73-87 - [c108]Andrea Paudice, Luis Muñoz-González, Emil C. Lupu:
Label Sanitization Against Label Flipping Poisoning Attacks. Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML 2018: 5-15 - [c107]Erisa Karafili, Linna Wang, Antonis C. Kakas, Emil Lupu:
Helping Forensic Analysts to Attribute Cyber-Attacks: An Argumentation-Based Reasoner. PRIMA 2018: 510-518 - [c106]Seraphin B. Calo, Dinesh C. Verma, Supriyo Chakraborty, Elisa Bertino, Emil Lupu, Gregory H. Cirincione:
Self-Generation of Access Control Policies. SACMAT 2018: 39-47 - [d1]Hassan Chizari, Emil Lupu:
IPI values of heart beats. Zenodo, 2018 - [i10]Andrea Paudice, Luis Muñoz-González, András György, Emil C. Lupu:
Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection. CoRR abs/1802.03041 (2018) - [i9]Andrea Paudice, Luis Muñoz-González, Emil C. Lupu:
Label Sanitization against Label Flipping Poisoning Attacks. CoRR abs/1803.00992 (2018) - [i8]Hassan Chizari, Emil Lupu:
Extracting Randomness From The Trend of IPI for Cryptographic Operators in Implantable Medical Devices. CoRR abs/1806.10984 (2018) - [i7]Ziyi Bao, Luis Muñoz-González, Emil C. Lupu:
Mitigation of Adversarial Attacks through Embedded Feature Selection. CoRR abs/1808.05705 (2018) - [i6]Kenneth T. Co, Luis Muñoz-González, Emil C. Lupu:
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Neural Networks. CoRR abs/1810.00470 (2018) - 2017
- [j20]Vittorio P. Illiano, Luis Muñoz-González, Emil C. Lupu:
Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 14(3): 279-293 (2017) - [j19]Luis Muñoz-González, Daniele Sgandurra, Andrea Paudice, Emil C. Lupu:
Efficient Attack Graph Analysis through Approximate Inference. ACM Trans. Priv. Secur. 20(3): 10:1-10:30 (2017) - [c105]Erisa Karafili, Antonis C. Kakas, Nikolaos I. Spanoudakis, Emil C. Lupu:
Argumentation-Based Security for Social Good. AAAI Fall Symposia 2017: 164-170 - [c104]Seraphin B. Calo, Emil Lupu, Elisa Bertino, Saritha Arunkumar, Gregory H. Cirincione, Brian Rivera, Alan Cullen:
Research challenges in dynamic policy-based autonomous security. IEEE BigData 2017: 2970-2973 - [c103]Erisa Karafili, Emil C. Lupu, Alan Cullen, Bill Williams, Saritha Arunkumar, Seraphin B. Calo:
Improving data sharing in data rich environments. IEEE BigData 2017: 2998-3005 - [c102]Luis Muñoz-González, Battista Biggio, Ambra Demontis, Andrea Paudice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli:
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization. AISec@CCS 2017: 27-38 - [c101]Martín Barrère, Emil C. Lupu:
Naggen: A network attack graph generation tool - IEEE CNS 17 poster. CNS 2017: 378-379 - [c100]Martín Barrère, Rodrigo Vieira Steiner, Rabih Mohsen, Emil C. Lupu:
Tracking the bad guys: An efficient forensic methodology to trace multi-step attacks using core attack graphs. CNSM 2017: 1-7 - [c99]Alan Cullen, Bill Williams, Elisa Bertino, Saritha Arunkumar, Erisa Karafili, Emil Lupu:
Mission Support for Drones: a Policy Based Approach. DroNet@MobiSys 2017: 7-12 - [c98]Erisa Karafili, Emil C. Lupu:
Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis. SACMAT 2017: 231-238 - [c97]Saritha Arunkumar, Stephen Pipes, Christian Makaya, Elisa Bertino, Erisa Karafili, Emil C. Lupu, Christopher Williams:
Next generation firewalls for dynamic coalitions. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c96]Diane Felmlee, Emil Lupu, Cassie McMillan, Erisa Karafili, Elisa Bertino:
Decision-making in policy governed human-autonomous systems teams. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c95]Erisa Karafili, Emil C. Lupu, Saritha Arunkumar, Elisa Bertino:
Argumentation-based policy analysis for drone systems. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c94]Erisa Karafili, Stephen Pipes, Emil C. Lupu:
Verification techniques for policy based systems. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c93]Vittorio P. Illiano, Rodrigo Vieira Steiner, Emil C. Lupu:
Unity is strength!: combining attestation and measurements inspection to handle malicious data injections in WSNs. WISEC 2017: 134-144 - [i5]Erisa Karafili, Antonis C. Kakas, Nikolaos I. Spanoudakis, Emil C. Lupu:
Argumentation-based Security for Social Good. CoRR abs/1705.00732 (2017) - [i4]Luis Muñoz-González, Battista Biggio, Ambra Demontis, Andrea Paudice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli:
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization. CoRR abs/1708.08689 (2017) - 2016
- [j18]Daniele Sgandurra, Emil C. Lupu:
Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems. ACM Comput. Surv. 48(3): 46:1-46:38 (2016) - [j17]Rodrigo Vieira Steiner, Emil Lupu:
Attestation in Wireless Sensor Networks: A Survey. ACM Comput. Surv. 49(3): 51:1-51:31 (2016) - [c92]Daniele Sgandurra, Erisa Karafili, Emil Lupu:
Formalizing Threat Models for Virtualized Systems. DBSec 2016: 251-267 - [i3]Luis Muñoz-González, Daniele Sgandurra, Andrea Paudice, Emil C. Lupu:
Efficient Attack Graph Analysis through Approximate Inference. CoRR abs/1606.07025 (2016) - [i2]Daniele Sgandurra, Luis Muñoz-González, Rabih Mohsen, Emil C. Lupu:
Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection. CoRR abs/1609.03020 (2016) - 2015
- [j16]Vittorio P. Illiano, Emil C. Lupu:
Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey. ACM Comput. Surv. 48(2): 24:1-24:33 (2015) - [j15]Alberto E. Schaeffer Filho, Emil C. Lupu, Morris Sloman:
Federating Policy-Driven Autonomous Systems: Interaction Specification and Management Patterns. J. Netw. Syst. Manag. 23(3): 753-793 (2015) - [j14]Vittorio P. Illiano, Emil C. Lupu:
Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks. IEEE Trans. Netw. Serv. Manag. 12(3): 496-510 (2015) - [c91]Pedro Rodrigues, Emil Constantine Lupu, Jeffrey Kramer:
Compositional Reliability Analysis for Probabilistic Component Automata. MiSE@ICSE 2015: 19-24 - [c90]Daniele Sgandurra, Francesco Di Cerbo, Slim Trabelsi, Fabio Martinelli, Emil C. Lupu:
Sharing Data through Confidential Clouds: An Architectural Perspective. TELERISE@ICSE 2015: 58-61 - [c89]Pedro Rodrigues, Jeff Kramer, Emil C. Lupu:
On re-assembling self-managed components. IM 2015: 727-733 - [e3]Joaquín García-Alfaro, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, Neeraj Suri:
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8872, Springer 2015, ISBN 978-3-319-17015-2 [contents] - [i1]Luis Muñoz-González, Daniele Sgandurra, Martín Barrère, Emil C. Lupu:
Exact Inference Techniques for the Dynamic Analysis of Attack Graphs. CoRR abs/1510.02427 (2015) - 2014
- [c88]Jose Rivera-Rubio, Ioannis Alexiou, Luke Dickens, Riccardo Secoli, Emil C. Lupu, Anil Anthony Bharath:
Associating locations from wearable cameras. BMVC 2014 - [c87]Pedro Rodrigues, Emil Lupu, Jeff Kramer:
LTSA-PCA: tool support for compositional reliability analysis. ICSE Companion 2014: 548-551 - [c86]Luke Dickens, Emil Lupu:
On efficient meta-data collection for crowdsensing. PerCom Workshops 2014: 62-67 - 2012
- [j13]Eskindir Asmare, Anandha Gopalan, Morris Sloman, Naranker Dulay, Emil Lupu:
Self-Management Framework for Mobile Autonomous Systems. J. Netw. Syst. Manag. 20(2): 244-275 (2012) - 2011
- [c85]Jiefei Ma, Alessandra Russo, Krysia Broda, Emil Lupu:
Multi-agent abductive reasoning with confidentiality. AAMAS 2011: 1137-1138 - [c84]Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil Lupu, Seraphin B. Calo, Morris Sloman:
Refinement of History-Based Policies. Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning 2011: 280-299 - [c83]Robert Craven, Jorge Lobo, Emil Lupu, Alessandra Russo, Morris Sloman:
Policy refinement: Decomposition and operationalization for dynamic domains. CNSM 2011: 1-9 - [c82]Pedro Rodrigues, Emil Lupu:
Model-based Self-Adaptive Components: A preliminary approach. ICCSW 2011: 73-72 - [c81]Jiefei Ma, Alessandra Russo, Krysia Broda, Emil Lupu:
Multi-agent Confidential Abductive Reasoning. ICLP (Technical Communications) 2011: 175-186 - [c80]Andreas Markitanis, Domenico Corapi, Alessandra Russo, Emil C. Lupu:
Learning User Behaviours in Real Mobile Domains. ILP (Late Breaking Papers) 2011: 43-51 - [c79]Domenico Corapi, Alessandra Russo, Emil Lupu:
Inductive Logic Programming in Answer Set Programming. ILP 2011: 91-97 - [c78]Anandha Gopalan, Vaibhav Gowadia, Enrico Scalavino, Emil Lupu:
Policy Driven Remote Attestation. MobiSec 2011: 148-159 - 2010
- [j12]Morris Sloman, Emil C. Lupu:
Engineering Policy-Based Ubiquitous Systems. Comput. J. 53(7): 1113-1127 (2010) - [c77]Jiefei Ma, Alessandra Russo, Krysia Broda, Emil Lupu:
Distributed abductive reasoning with constraints. AAMAS 2010: 1381-1382 - [c76]Fabrizio Maria Maggi, Domenico Corapi, Alessandra Russo, Emil Lupu, Giuseppe Visaggio:
Revising Process Models through Inductive Learning. Business Process Management Workshops 2010: 182-193 - [c75]Enrico Scalavino, Giovanni Russello, Rudi Ball, Vaibhav Gowadia, Emil C. Lupu:
An opportunistic authority evaluation scheme for data security in crisis management scenarios. AsiaCCS 2010: 157-168 - [c74]Robert Craven, Jorge Lobo, Emil C. Lupu, Alessandra Russo, Morris Sloman:
Decomposition techniques for policy refinement. CNSM 2010: 72-79 - [c73]Jiefei Ma, Krysia Broda, Alessandra Russo, Emil Lupu:
Distributed Abductive Reasoning with Constraints. DALT 2010: 148-166 - [c72]Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu:
A Labelling System for Derived Data Control. DBSec 2010: 65-80 - [c71]Vaibhav Gowadia, Enrico Scalavino, Emil C. Lupu, Dmitry Starostin, Alexey Orlov:
Secure cross-domain data sharing architecture for crisis management. Digital Rights Management Workshop 2010: 43-46 - [c70]Domenico Corapi, Alessandra Russo, Emil Lupu:
Inductive Logic Programming as Abductive Search. ICLP (Technical Communications) 2010: 54-63 - [c69]Giovanni Russello, Enrico Scalavino, Naranker Dulay, Emil C. Lupu:
Coordinating Data Usage Control in Loosely-Connected Networks. POLICY 2010: 30-39 - [c68]Enrico Scalavino, Vaibhav Gowadia, Rudi Ball, Emil C. Lupu, Giovanni Russello:
Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios. POLICY 2010: 53-56
2000 – 2009
- 2009
- [j11]Marinos Charalambides, Paris Flegkas, George Pavlou, Javier Rubio-Loyola, Arosha K. Bandara, Emil C. Lupu, Alessandra Russo, Naranker Dulay, Morris Sloman:
Policy conflict analysis for diffserv quality of service management. IEEE Trans. Netw. Serv. Manag. 6(1): 15-30 (2009) - [j10]Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil C. Lupu:
A lightweight policy system for body sensor networks. IEEE Trans. Netw. Serv. Manag. 6(3): 137-148 (2009) - [c67]Jiefei Ma, Alessandra Russo, Krysia Broda, Emil Lupu:
Multi-agent planning with confidentiality. AAMAS (2) 2009: 1275-1276 - [c66]Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil C. Lupu, Arosha K. Bandara:
Expressive policy analysis with enhanced system dynamicity. AsiaCCS 2009: 239-250 - [c65]Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu:
PAES: Policy-Based Authority Evaluation Scheme. DBSec 2009: 268-282 - [c64]Kevin P. Twidle, Naranker Dulay, Emil Lupu, Morris Sloman:
Ponder2: A Policy System for Autonomous Pervasive Environments. ICAS 2009: 330-335 - [c63]Themistoklis Bourdenas, Morris Sloman, Emil C. Lupu:
Self-healing for Pervasive Computing Systems. WADS 2009: 1-25 - [c62]Domenico Corapi, Oliver Ray, Alessandra Russo, Arosha K. Bandara, Emil C. Lupu:
Learning Rules from User Behaviour. AIAI 2009: 459-468 - [c61]Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu, Alessandra Russo:
Using argumentation logic for firewall configuration management. Integrated Network Management 2009: 180-187 - [c60]Eskindir Asmare, Anandha Gopalan, Morris Sloman, Naranker Dulay, Emil C. Lupu:
A Mission Management Framework for Unmanned Autonomous Vehicles. MOBILWARE 2009: 222-235 - [c59]Eskindir Asmare, Anandha Gopalan, Morris Sloman, Naranker Dulay, Emil Lupu:
A Policy-Based Management Architecture for Mobile Collaborative Teams. PerCom 2009: 1-6 - [c58]Sye Loong Keoh, Emil C. Lupu, Morris Sloman:
Securing Body Sensor Networks: Sensor Association and Key Management. PerCom 2009: 1-6 - [c57]Alberto E. Schaeffer Filho, Emil C. Lupu, Morris Sloman:
Realising management and composition of Self-Managed Cells in pervasive healthcare. PervasiveHealth 2009: 1-8 - [c56]Yanmin Zhu, Morris Sloman, Emil Lupu, Sye Loong Keoh:
Vesta: A secure and autonomic system for pervasive healthcare. PervasiveHealth 2009: 1-8 - [c55]Alberto E. Schaeffer Filho, Emil C. Lupu, Morris Sloman, Susan Eisenbach:
Verification of Policy-Based Self-Managed Cell Interactions Using Alloy. POLICY 2009: 37-40 - [c54]Robert Craven, Jorge Lobo, Emil Lupu, Alessandra Russo, Morris Sloman:
Security policy refinement using data integration: a position paper. SafeConfig 2009: 25-28 - 2008
- [j9]Emil Lupu, Naranker Dulay, Morris Sloman, Joseph S. Sventek, Steven Heeps, Stephen D. Strowes, Kevin P. Twidle, Sye Loong Keoh, Alberto E. Schaeffer Filho:
AMUSE: autonomic management of ubiquitous e-Health systems. Concurr. Comput. Pract. Exp. 20(3): 277-295 (2008) - [j8]Sherif Yusuf, Wayne Luk, Morris Sloman, Naranker Dulay, Emil C. Lupu, Geoffrey Brown:
Reconfigurable Architecture for Network Flow Analysis. IEEE Trans. Very Large Scale Integr. Syst. 16(1): 57-65 (2008) - [c53]Alberto E. Schaeffer Filho, Emil Lupu, Morris Sloman, Sye Loong Keoh, Jorge Lobo, Seraphin B. Calo:
A Role-Based Infrastructure for the Management of Dynamic Communities. AIMS 2008: 1-14 - [c52]Steve Barker, David W. Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham:
Panel Session: What Are the Key Challenges in Distributed Security?. DBSec 2008: 219-221 - [c51]Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil Lupu, Naranker Dulay, Nat Pryce:
An Efficient Policy System for Body Sensor Networks. ICPADS 2008: 383-390 - [c50]Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil Lupu, Yu Zhang, Naranker Dulay, Nathaniel Pryce:
Finger: An efficient policy system for body sensor networks. MASS 2008: 428-433 - [c49]Eskindir Asmare, Anandha Gopalan, Morris Sloman, Naranker Dulay, Emil Lupu:
Adaptive self-management of teams of autonomous vehicles. MPAC 2008: 1-6 - [c48]Kevin P. Twidle, Emil Lupu, Naranker Dulay, Morris Sloman:
Ponder2 - A Policy Environment for Autonomous Pervasive Systems. POLICY 2008: 245-246 - [c47]Carolyn Brodie, David George, Clare-Marie Karat, John Karat, Jorge Lobo, Mandis Beigi, Xiping Wang, Seraphin B. Calo, Dinesh C. Verma, Alberto E. Schaeffer Filho, Emil Lupu, Morris Sloman:
The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment. POLICY 2008: 247-249 - 2007
- [c46]Alberto E. Schaeffer Filho, Emil Lupu:
Abstractions to Support Interactions Between Self-Managed Cells. AIMS 2007: 160-163 - [c45]Nilufer Tuptuk, Emil Lupu:
Risk Based Authorisation for Mobile Ad Hoc Networks. AIMS 2007: 188-191 - [c44]Kevin P. Twidle, Emil Lupu:
Ponder2 - Policy-Based Self Managed Cells. AIMS 2007: 230 - [c43]Sye Loong Keoh, Kevin P. Twidle, Nathaniel Pryce, Alberto E. Schaeffer Filho, Emil Lupu, Naranker Dulay, Morris Sloman, Steven Heeps, Stephen D. Strowes, Joe Sventek, Eleftheria Katsiri:
Policy-based Management for Body-Sensor Networks. BSN 2007: 92-98 - [c42]Steven Heeps, Joe Sventek, Naranker Dulay, Alberto E. Schaeffer Filho, Emil C. Lupu, Morris Sloman, Stephen D. Strowes:
Dynamic Ontology Mapping for Interacting Autonomous Systems. IWSOS 2007: 255-263 - [c41]Sye Loong Keoh, Naranker Dulay, Emil Lupu, Kevin P. Twidle, Alberto E. Schaeffer Filho, Morris Sloman, Steven Heeps, Stephen D. Strowes, Joseph S. Sventek:
Self-Managed Cell: A Middleware for Managing Body-Sensor Networks. MobiQuitous 2007: 1-5 - [c40]Emil Lupu, Naranker Dulay, Joe Sventek, Morris Sloman:
Autonomous Pervasive Systems and the Policy Challenges of a Small World! POLICY 2007: 3-7 - [c39]Arosha K. Bandara, Alessandra Russo, Emil C. Lupu:
Towards Learning Privacy Policies. POLICY 2007: 274 - [c38]Alberto E. Schaeffer Filho, Emil C. Lupu, Naranker Dulay, Sye Loong Keoh, Kevin P. Twidle, Morris Sloman, Steven Heeps, Stephen D. Strowes, Joe Sventek:
Towards Supporting Interactions between Self-Managed Cells. SASO 2007: 224-236 - 2006
- [j7]Arosha K. Bandara, Emil C. Lupu, Alessandra Russo, Naranker Dulay, Morris Sloman, Paris Flegkas, Marinos Charalambides, George Pavlou:
Policy refinement for IP differentiated services Quality of Service management. IEEE Trans. Netw. Serv. Manag. 3(2): 2-13 (2006) - [c37]Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu, Alessandra Russo:
Using Argumentation Logic for Firewall Policy Specification and Analysis. DSOM 2006: 185-196 - [c36]Stephen D. Strowes, Nagwa L. Badr, Steven Heeps, Emil Lupu, Morris Sloman:
An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health. ICDCS Workshops 2006: 22 - [c35]Marinos Charalambides, Paris Flegkas, George Pavlou, Javier Rubio-Loyola, Arosha K. Bandara, Emil C. Lupu, Alessandra Russo, Morris Sloman, Naranker Dulay:
Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management. NOMS 2006: 294-304 - 2005
- [c34]Joseph S. Sventek, Nagwa L. Badr, Naranker Dulay, Steven Heeps, Emil Lupu, Morris Sloman:
Self-Managed Cells and their Federation. CAiSE Workshops (2) 2005: 97-107 - [c33]Wayne Luk, Sherif Yusuf, Morris Sloman, Geoffrey Brown, Emil C. Lupu, Naranker Dulay:
A Combined Hardware-Software Architecture for Network Flow. ERSA 2005: 149-155 - [c32]Alvaro E. Arenas, Ivan Djordjevic, Theo Dimitrakos, Leonid Titkov, Joris Claessens, Christian Geuer-Pollmann, Emil C. Lupu, Nilufer Tuptuk, Stefan Wesner, Lutz Schubert:
Toward Web Services Profiles for Trust and Security in Virtual Organisations. PRO-VE 2005: 175-182 - [c31]Arosha K. Bandara, Emil C. Lupu, Alessandra Russo, Naranker Dulay, Morris Sloman, Paris Flegkas, Marinos Charalambides, George Pavlou:
Policy refinement for DiffServ quality of service management. Integrated Network Management 2005: 469-482 - [c30]Naranker Dulay, Emil C. Lupu, Morris Sloman, Joe Sventek, Nagwa L. Badr, Steven Heeps:
Self-managed Cells for Ubiquitous Systems. MMM-ACNS 2005: 1-6 - [c29]Marinos Charalambides, Paris Flegkas, George Pavlou, Arosha K. Bandara, Emil C. Lupu, Alessandra Russo, Naranker Dulay, Morris Sloman, Javier Rubio-Loyola:
Policy Conflict Analysis for Quality of Service Management. POLICY 2005: 99-108 - [c28]Sye Loong Keoh, Emil Lupu:
An Efficient Access Control Model for Mobile Ad-Hoc Communities. SPC 2005: 210-224 - [c27]Adomas Svirskas, Michael D. Wilson, Alvaro E. Arenas, Emil C. Lupu, Nilufer Tuptuk, David W. Chadwick, Pablo Giambiagi, Theodosis Dimitrakos, Bob Roberts:
Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures. CEC Workshops 2005: 3-11 - 2004
- [j6]Rebecca Montanari, Emil Lupu, Cesare Stefanelli:
Policy-Based Dynamic Reconfiguration of Mobile-Code Applications. Computer 37(7): 73-80 (2004) - [c26]Sye Loong Keoh, Emil Lupu, Morris Sloman:
PEACE: A Policy-Based Establishment of Ad-hoc Communities. ACSAC 2004: 386-395 - [c25]Leonidas Lymberopoulos, Emil Lupu, Morris Sloman:
PONDER policy implementation and validation in a CIM and differentiated services framework. NOMS (1) 2004: 31-44 - [c24]Arosha K. Bandara, Emil Lupu, Jonathan D. Moffett, Alessandra Russo:
A Goal-based Approach to Policy Refinement. POLICY 2004: 229-239 - 2003
- [j5]Leonidas Lymberopoulos, Emil Lupu, Morris Sloman:
An Adaptive Policy-based Framework for Network Services Management. J. Netw. Syst. Manag. 11(3): 277-303 (2003) - [c23]T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay:
Compiling Policy Descriptions into Reconfigurable Firewall Processors. FCCM 2003: 39- - [c22]T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay:
Irregular Reconfigurable CAM Structures for Firewall Applications. FPL 2003: 890-899 - [c21]Dhruv Pandya, Ravi Jain, Emil Lupu:
Indoor location estimation using multiple wireless technologies. PIMRC 2003: 2208-2212 - [c20]Arosha K. Bandara, Emil Lupu, Alessandra Russo:
Using Event Calculus to Formalise Policy Specification and Analysis. POLICY 2003: 26- - 2002
- [j4]Morris Sloman, Emil Lupu:
Security and management policy specification. IEEE Netw. 16(2): 10-19 (2002) - [c19]Dinesh Ganesarajah, Emil Lupu:
Workflow-Based Composition of Web-Services: A Business Model or a Programming Paradigm? EDOC 2002: 273-284 - [c18]T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay:
Development framework for firewall processors. FPT 2002: 352-355 - [c17]Nicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman, Toshio Tonouchi:
Tools for domain-based policy management of distributed systems. NOMS 2002: 203-217 - [c16]Leonidas Lymberopoulos, Emil Lupu, Morris Sloman:
An Adaptive Policy Based Management Framework for Differentiated Services Networks. POLICY 2002: 147-158 - [c15]Sye Loong Keoh, Emil Lupu:
Towards flexible credential verification in mobile ad-hoc networks. POMC 2002: 58-65 - 2001
- [j3]Emil Lupu, Subrata Mazumdar, Rolf Stadler:
Selected Topics in Network and Systems Management. Comput. Networks 35(1): 1-4 (2001) - [c14]Naranker Dulay, Nicodemos Damianou, Emil Lupu, Morris Sloman:
A Policy Language for the Management of Distributed Agents. AOSE 2001: 84-100 - [c13]Naranker Dulay, Emil Lupu, Morris Sloman, Nicodemos Damianou:
A Policy Deployment Model for the Ponder Language. Integrated Network Management 2001: 529-543 - [c12]Nicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman:
The Ponder Policy Specification Language. POLICY 2001: 18-38 - [e2]Morris Sloman, Jorge Lobo, Emil Lupu:
Policies for Distributed Systems and Networks, International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001, Proceedings. Lecture Notes in Computer Science 1995, Springer 2001, ISBN 3-540-41610-2 [contents] - 2000
- [c11]Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman:
A Flexible Access Control Service for Java Mobile Code. ACSAC 2000: 356-365 - [c10]Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemos Damianou:
Ponder: Realising Enterprise Viewpoint Concepts. EDOC 2000: 66-75
1990 – 1999
- 1999
- [j2]Emil Lupu, Morris Sloman:
Conflicts in Policy-Based Distributed Systems Management. IEEE Trans. Software Eng. 25(6): 852-869 (1999) - [c9]Susan Eisenbach, Emil Lupu, Karen Meidl, Hani Rizkallah:
Can Corba save a fringe language from becoming obsolete? DAIS 1999: 272-286 - [c8]Morris Sloman, Emil Lupu:
Policy Specification for Programmable Networks. IWAN 1999: 73-84 - [c7]Jonathan D. Moffett, Emil Lupu:
The Uses of Role Hierarchies in Access Control. ACM Workshop on Role-Based Access Control 1999: 153-160 - [c6]Emil Lupu, Zoran Milosevic, Morris Sloman:
Use of Roles and Policies for Specifying and Managing a Virtual Enterprise. RIDE 1999: 72-79 - [e1]Morris Sloman, Subrata Mazumdar, Emil C. Lupu:
1999 IEEE/IFIP International Symposium on Integrated Network Management, IM 1999, Boston, USA, May 24-28, 1999. Proceedings. IEEE 1999, ISBN 0-7803-5748-5 [contents] - 1998
- [b1]Emil Constantine Lupu:
A role based framework for distributed systems management. Imperial College London, UK, 1998 - 1997
- [j1]Emil Lupu, Morris Sloman:
Towards a Role-Based Framework for Distributed Systems Management. J. Netw. Syst. Manag. 5(1): 5-30 (1997) - [c5]Emil Lupu, Morris Sloman:
A Policy Based Role Object Model. EDOC 1997: 36-47 - [c4]Emil Lupu, Morris Sloman:
Conflict Analysis for Management Policies. Integrated Network Management 1997: 430-443 - [c3]Emil Lupu, Morris Sloman:
Reconciling role based management and role based access control. ACM Workshop on Role-Based Access Control 1997: 135-141 - 1996
- [c2]Nicholas Yialelis, Emil Lupu, Morris Sloman:
Role-based security for distributed object systems. WETICE 1996: 80-85 - 1995
- [c1]Emil Lupu, Damian A. Marriott, Morris Sloman, Nicholas Yialelis:
A policy based role framework for access control. ACM Workshop on Role-Based Access Control 1995
Coauthor Index
aka: Luis Munoz-Gonzalez
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint