Profil

BECKER Sheila

Main Referenced Co-authors
STATE, Radu  (4)
ENGEL, Thomas  (3)
Abdelnur, Humberto J. (1)
LAGRAA, Sofiane  (1)
Nita-Rotaru, Cristina (1)
Main Referenced Keywords
Security (2); Frog-Boiling (1); Game Theory (1); Machine Learning (1); OpenVswitch (1);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Services and Data management research group (SEDAN) (1)
Main Referenced Disciplines
Computer science (5)

Publications (total 5)

The most downloaded
239 downloads
Rivera, S., Lagraa, S., State, R., Nita-Rotaru, C., & Becker, S. (2019). ROS-Defender: SDN-based Security Policy Enforcement for Robotic Applications. In IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019. https://hdl.handle.net/10993/39887

The most cited

19 citations (Scopus®)

Rivera, S., Lagraa, S., State, R., Nita-Rotaru, C., & Becker, S. (2019). ROS-Defender: SDN-based Security Policy Enforcement for Robotic Applications. In IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019. https://hdl.handle.net/10993/39887

Rivera, S., Lagraa, S., State, R., Nita-Rotaru, C., & Becker, S. (2019). ROS-Defender: SDN-based Security Policy Enforcement for Robotic Applications. In IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019.
Peer reviewed

Becker, S. (2012). Conceptual Approaches for Securing Networks and Systems [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/15413

Becker, S., Abdelnur, H. J., State, R., & Engel, T. (2010). An Autonomic Testing Framework for IPv6 Configuration Protocols. In Lecture Notes in Computer Science 6155 (pp. 65 - 76). Springer. doi:10.1007/978-3-642-13986-4_7
Peer reviewed

Becker, S., State, R., & Engel, T. (2009). Using Game Theory to configure P2P SIP. Lecture Notes in Computer Science. doi:10.1145/1595637.1595645
Peer reviewed

Becker, S., State, R., & Engel, T. (2009). Defensive configuration with game theory. The 11th IFIP/IEEE International Symposium on Integrated Network Management. doi:10.1109/INM.2009.5188848
Peer reviewed

Contact ORBilu