default search action
Damas P. Gruska
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c32]Aliyu Tanko Ali, Damas P. Gruska:
States of Attack Under Incomplete Information. CCWC 2022: 801-807 - 2021
- [j17]Roberto Barbuti, Pasquale Bove, Roberta Gori, Damas P. Gruska, Francesca Levi, Paolo Milazzo:
Encoding Threshold Boolean Networks into Reaction Systems for the Analysis of Gene Regulatory Networks. Fundam. Informaticae 179(2): 205-225 (2021) - [c31]Damas P. Gruska, M. Carmen Ruiz:
Process Opacity and Insertion Functions. CS&P 2021: 83-92 - [c30]Aliyu Tanko Ali, Damas P. Gruska:
Attack Trees with Time Constraints. CS&P 2021: 93-105 - [c29]Damas P. Gruska:
Security Enforcing. CS&P (Revised Selected Papers) 2021: 123-143 - [c28]Aliyu Tanko Ali, Damas P. Gruska:
Dynamic Attack Trees. OVERLAY@GandALF 2021: 25-29 - [c27]Damas P. Gruska:
Time Insertion Functions. MEDI Workshops 2021: 181-188 - [c26]Aliyu Tanko Ali, Damas P. Gruska:
Reversible Attack Trees. UEMCON 2021: 279-285
2010 – 2019
- 2019
- [j16]Roberta Gori, Damas P. Gruska, Paolo Milazzo:
Studying Opacity of Reaction Systems through Formula Based Predictors. Fundam. Informaticae 165(3-4): 303-319 (2019) - [c25]Aliyu Tanko Ali, Damas P. Gruska:
Attack Protection Tree. CS&P 2019 - [c24]Damas P. Gruska, M. Carmen Ruiz:
Observations, Testing and Security. CS&P 2019 - [c23]Damas P. Gruska, M. Carmen Ruiz:
Security of Low Level IoT Protocols. ICCS (3) 2019: 621-633 - [c22]Damas P. Gruska, M. Carmen Ruiz:
Security Testing for Multi-Agent Systems. IWANN (1) 2019: 703-715 - [c21]Damas P. Gruska:
Security and time insertion. PCI 2019: 154-157 - [c20]M. Carmen Ruiz, Celia Garrido-Hidalgo, Damas P. Gruska, Teresa Olivares, Diego Hortelano, Luis Roda-Sanchez:
Modeling and Evaluation of a Power-Aware Algorithm for IoT Bluetooth Low Energy Devices. SmartIoT 2019: 28-35 - 2018
- [c19]Roberta Gori, Damas P. Gruska, Paolo Milazzo:
Hidden States in Reaction Systems. CS&P 2018 - [c18]Damas P. Gruska, M. Carmen Ruiz:
Opacity-enforcing for Process Algebras. CS&P 2018 - 2016
- [j15]Damas P. Gruska:
Differential Privacy and Security. Fundam. Informaticae 143(1-2): 73-87 (2016) - [c17]Mikulás Pataky, Damas P. Gruska:
Analysing of M-AHIDS with Future States on DARPA and KDD99 Benchmarks. CS&P 2016: 153-164 - [c16]Damas P. Gruska:
Process Environment Opacity. CS&P 2016: 209-220 - 2015
- [c15]Damas P. Gruska:
Gained and Excluded Classified Actions by Dynamic Security Policies. CS&P 2015: 170-181 - [c14]Michal Kovác, Damas P. Gruska:
Sequential P Systems with Active Membranes Working on Sets. CS&P 2015: 247-257 - [c13]Damas P. Gruska:
Dynamics Security Policies and Process Opacity for Timed Process Algebras. Ershov Memorial Conference 2015: 149-157 - 2014
- [j14]Damas P. Gruska:
Simulation Opacity. Fundam. Informaticae 133(2-3): 165-179 (2014) - [c12]Damas P. Gruska:
Differential Privacy and Security. CS&P 2014: 80-91 - [c11]Mikulás Pataky, Damas P. Gruska:
Multi-Agent Heterogeneous Intrusion Detection System. CS&P 2014: 184-195 - [c10]Damas P. Gruska:
Process Opacity for Timed Process Algebra. Ershov Memorial Conference 2014: 151-160 - 2013
- [j13]Damas P. Gruska:
Information Flow Testing. Fundam. Informaticae 128(1-2): 81-95 (2013) - [c9]Damas P. Gruska:
Opacity Testing. CS&P 2013: 169-180 - 2012
- [j12]Damas P. Gruska:
Informational Analysis of Security and Integrity. Fundam. Informaticae 120(3-4): 295-309 (2012) - [j11]Damas P. Gruska:
Quantification of Positive and Negative Attacker's Information. Fundam. Informaticae 120(3-4): 311-324 (2012) - [c8]Damas P. Gruska:
Information Flow and Concurrent Imperative Languages. CS&P 2012: 123-134 - [c7]Damas P. Gruska:
Test Based Security. CS&P 2012: 135-146 - 2011
- [j10]Damas P. Gruska:
Gained and Excluded Private Actions by Process Observations. Fundam. Informaticae 109(3): 281-295 (2011) - 2010
- [j9]Roberto Barbuti, Andrea Maggiolo-Schettini, Paolo Milazzo, Damas P. Gruska:
A Notion of Biological Diagnosability Inspired by the Notion of Opacity in Systems Security. Fundam. Informaticae 102(1): 19-34 (2010) - [j8]Damas P. Gruska:
Process Algebra Contexts and Security Properties. Fundam. Informaticae 102(1): 63-76 (2010) - [c6]Damas P. Gruska:
Diagnosability of Nested Intruders. BIONETICS 2010: 92-99
2000 – 2009
- 2009
- [j7]Damas P. Gruska:
Quantifying Security for Timed Process Algebras. Fundam. Informaticae 93(1-3): 155-169 (2009) - 2008
- [j6]Damas P. Gruska:
Probabilistic Information Flow Security. Fundam. Informaticae 85(1-4): 173-187 (2008) - [j5]Damas P. Gruska, Andrea Maggiolo-Schettini, Paolo Milazzo:
Security in a Model for Long-running Transactions. Fundam. Informaticae 85(1-4): 189-203 (2008) - 2007
- [j4]Damas P. Gruska:
Observation Based System Security. Fundam. Informaticae 79(3-4): 335-346 (2007) - 2006
- [j3]Damas P. Gruska:
Network Information Flow. Fundam. Informaticae 72(1-3): 167-180 (2006) - [c5]Damas P. Gruska:
Information-Flow Attacks Based on Limited Observations. Ershov Memorial Conference 2006: 223-234 - 2001
- [j2]Damas P. Gruska, Andrea Maggiolo-Schettini:
Process Algebras for Network Communication. Fundam. Informaticae 45(4): 359-378 (2001)
1990 – 1999
- 1997
- [c4]Damas P. Gruska:
Bounded Concurrency. FCT 1997: 198-209 - 1996
- [c3]Damas P. Gruska:
Process Algebra for Shared Ressources. Parcella 1996: 300-301 - 1992
- [c2]Damas P. Gruska, Andrea Maggiolo-Schettini:
Process Communication Environment. NAPAW 1992: 27-40 - [c1]Damas P. Gruska:
Real-Time Communication Networks. NATO ASI RTC 1992: 691 - 1990
- [j1]Damas P. Gruska:
Genomorphisms of Semi-Modular Lattices. J. Comput. Syst. Sci. 40(2): 182-187 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint