13 papers:
KDD-2013-Gesher #adaptation- Adaptive adversaries: building systems to fight fraud and cyber intruders (AG), p. 1136.
RTA-2009-BaudetCD #named- YAPA: A Generic Tool for Computing Intruder Knowledge (MB, VC, SD), pp. 148–163.
RTA-2009-TiuG #analysis #proving- A Proof Theoretic Analysis of Intruder Theories (AT, RG), pp. 103–117.
ICPR-2008-GesuBF #identification- Intruders pattern identification (VDG, GLB, JHF), pp. 1–4.
CASE-2007-YooG #analysis #network #process- Intruder Activity Analysis under Unreliable Sensor Networks (TSY, HEG), pp. 578–584.
RTA-2007-AnantharamanNR- Intruders with Caps (SA, PN, MR), pp. 20–35.
CASE-2006-SchiffG #automation #network #using- Automated Intruder Tracking using Particle Filtering and a Network of Binary Motion Sensors (JS, KG), pp. 580–587.
RTA-2006-ChevalierR- Hierarchical Combination of Intruder Theories (YC, MR), pp. 108–122.
ICALP-2005-ChevalierR- Combining Intruder Theories (YC, MR), pp. 639–651.
RTA-2005-LafourcadeLT #deduction #equation #morphism- Intruder Deduction for AC-Like Equational Theories with Homomorphisms (PL, DL, RT), pp. 308–322.
FoSSaCS-2004-Comon-Lundh- Intruder Theories (Ongoing Work) (HCL), pp. 1–4.
CSL-2003-ChevalierKRTV #bound- Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions (YC, RK, MR, MT, LV), pp. 128–141.
LICS-2003-Comon-LundhS #constraints #deduction #theorem proving- Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or (HCL, VS), p. 271–?.