### 13 papers:

- KDD-2013-Gesher #adaptation
- Adaptive adversaries: building systems to fight fraud and cyber intruders (AG), p. 1136.
- RTA-2009-BaudetCD #named
- YAPA: A Generic Tool for Computing Intruder Knowledge (MB, VC, SD), pp. 148–163.
- RTA-2009-TiuG #analysis #proving
- A Proof Theoretic Analysis of Intruder Theories (AT, RG), pp. 103–117.
- ICPR-2008-GesuBF #identification
- Intruders pattern identification (VDG, GLB, JHF), pp. 1–4.
- CASE-2007-YooG #analysis #network #process
- Intruder Activity Analysis under Unreliable Sensor Networks (TSY, HEG), pp. 578–584.
- RTA-2007-AnantharamanNR
- Intruders with Caps (SA, PN, MR), pp. 20–35.
- CASE-2006-SchiffG #automation #network #using
- Automated Intruder Tracking using Particle Filtering and a Network of Binary Motion Sensors (JS, KG), pp. 580–587.
- RTA-2006-ChevalierR
- Hierarchical Combination of Intruder Theories (YC, MR), pp. 108–122.
- ICALP-2005-ChevalierR
- Combining Intruder Theories (YC, MR), pp. 639–651.
- RTA-2005-LafourcadeLT #deduction #equation #morphism
- Intruder Deduction for
*AC*-Like Equational Theories with Homomorphisms (PL, DL, RT), pp. 308–322.
- FoSSaCS-2004-Comon-Lundh
- Intruder Theories (Ongoing Work) (HCL), pp. 1–4.
- CSL-2003-ChevalierKRTV #bound
- Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions (YC, RK, MR, MT, LV), pp. 128–141.
- LICS-2003-Comon-LundhS #constraints #deduction #theorem proving
- Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or (HCL, VS), p. 271–?.