Profil

BECKER Sheila

Main Referenced Co-authors
STATE, Radu  (4)
ENGEL, Thomas  (3)
Abdelnur, Humberto J. (1)
LAGRAA, Sofiane  (1)
Nita-Rotaru, Cristina (1)
Main Referenced Keywords
Security (2); Frog-Boiling (1); Game Theory (1); Machine Learning (1); OpenVswitch (1);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Services and Data management research group (SEDAN) (1)
Main Referenced Disciplines
Computer science (5)

Publications (total 5)

The most downloaded
262 downloads
RIVERA, S., LAGRAA, S., STATE, R., Nita-Rotaru, C., & BECKER, S. (2019). ROS-Defender: SDN-based Security Policy Enforcement for Robotic Applications. In IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019. https://hdl.handle.net/10993/39887

The most cited

22 citations (Scopus®)

RIVERA, S., LAGRAA, S., STATE, R., Nita-Rotaru, C., & BECKER, S. (2019). ROS-Defender: SDN-based Security Policy Enforcement for Robotic Applications. In IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019. https://hdl.handle.net/10993/39887

RIVERA, S., LAGRAA, S., STATE, R., Nita-Rotaru, C., & BECKER, S. (2019). ROS-Defender: SDN-based Security Policy Enforcement for Robotic Applications. In IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019.
Peer reviewed

BECKER, S. (2012). Conceptual Approaches for Securing Networks and Systems [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/15413

BECKER, S., Abdelnur, H. J., STATE, R., & ENGEL, T. (2010). An Autonomic Testing Framework for IPv6 Configuration Protocols. In Lecture Notes in Computer Science 6155 (pp. 65 - 76). Springer. doi:10.1007/978-3-642-13986-4_7
Peer reviewed

BECKER, S., STATE, R., & ENGEL, T. (2009). Using Game Theory to configure P2P SIP. Lecture Notes in Computer Science. doi:10.1145/1595637.1595645
Peer reviewed

BECKER, S., STATE, R., & ENGEL, T. (2009). Defensive configuration with game theory. The 11th IFIP/IEEE International Symposium on Integrated Network Management. doi:10.1109/INM.2009.5188848
Peer reviewed

Contact ORBilu