Automating the security analysis process of secure ad hoc routing protocols
Andel, T.R., Back, G., Yasinsac, A.
Published in Simulation modelling practice and theory (01.10.2011)
Published in Simulation modelling practice and theory (01.10.2011)
Get full text
Journal Article
Metadata for anomaly-based security protocol attack deduction
Leckie, T., Yasinsac, A.
Published in IEEE transactions on knowledge and data engineering (01.09.2004)
Published in IEEE transactions on knowledge and data engineering (01.09.2004)
Get full text
Journal Article
Limitations of on demand secure routing protocols
Prabha Ramachandran, Yasinsac, A.
Published in Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004 (2004)
Published in Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004 (2004)
Get full text
Conference Proceeding
Of Paper Trails and Voter Receipts
Yasinsac, A., Bishop, M.
Published in Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) (01.01.2008)
Published in Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) (01.01.2008)
Get full text
Conference Proceeding
Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines
Peisert, S., Bishop, M., Yasinsac, A.
Published in 2009 42nd Hawaii International Conference on System Sciences (01.01.2009)
Published in 2009 42nd Hawaii International Conference on System Sciences (01.01.2009)
Get full text
Conference Proceeding
Multi-domain Trust Management in variable-threat environments - a user-centric model
Burmester, M., Das, P., Edwards, M., Yasinsac, A.
Published in MILCOM 2009 - 2009 IEEE Military Communications Conference (01.10.2009)
Published in MILCOM 2009 - 2009 IEEE Military Communications Conference (01.10.2009)
Get full text
Conference Proceeding
Multi-domain Trust Management in variable-threat environments using rollback-access
Burmester, M., Das, P., Edwards, M., Yasinsac, A.
Published in MILCOM 2008 - 2008 IEEE Military Communications Conference (01.11.2008)
Published in MILCOM 2008 - 2008 IEEE Military Communications Conference (01.11.2008)
Get full text
Conference Proceeding
Computer forensics education
Yasinsac, A., Erbacher, R.F., Marks, D.G., Pollitt, M.M., Sommer, P.M.
Published in IEEE security & privacy (01.07.2003)
Published in IEEE security & privacy (01.07.2003)
Get full text
Magazine Article
Towards Internet voting security: A threat tree for risk assessment
Pardue, H, Yasinsac, A, Landry, J
Published in 2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS) (01.10.2010)
Published in 2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS) (01.10.2010)
Get full text
Conference Proceeding