Folgen
Assane Gueye
Assane Gueye
Assistant Teaching Professor
Bestätigte E-Mail-Adresse bei andrew.cmu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Design of network topology in an adversarial environment
A Gueye, JC Walrand, V Anantharam
International Conference on Decision and Game Theory for Security, 1-20, 2010
482010
A game theoretical approach to communication security
A Gueye
University of California, Berkeley, 2011
372011
Towards a metric for communication network vulnerability to attacks: A game theoretic approach
A Gueye, V Marbukh, JC Walrand
International Conference on Game Theory for Networks, 259-274, 2012
282012
A network topology design game: How to choose communication links in an adversarial environment
A Gueye, JC Walrand, V Anantharam
Proc. of the 2nd international icst conference on game theory for networks …, 2011
262011
A game-theoretic framework for network security vulnerability assessment and mitigation
A Gueye, V Marbukh
International Conference on Decision and Game Theory for Security, 186-200, 2012
212012
Security in networks: A game-theoretic approach
A Gueye, JC Walrand
2008 47th IEEE Conference on Decision and Control, 829-834, 2008
182008
Network design game with both reliability and security failures
GA Schwartz, S Amin, A Gueye, J Walrand
2011 49th Annual Allerton Conference on Communication, Control, and …, 2011
132011
Quantifying network topology robustness under budget constraints: General model and computational complexity
A Laszka, A Gueye
International Conference on Decision and Game Theory for Security, 154-174, 2013
102013
How to choose communication links in an adversarial environment?
A Gueye, JC Walrand, V Anantharam
International Conference on Game Theory for Networks, 233-248, 2011
72011
Measurements of the most significant software security weaknesses
CC Galhardo, P Mell, I Bojanova, A Gueye
Annual Computer Security Applications Conference, 154-164, 2020
62020
A Historical and Statistical Studyof the Software Vulnerability Landscape
A Gueye, P Mell
arXiv preprint arXiv:2102.01722, 2021
52021
Network topology vulnerability/cost trade-off: Model, application, and computational complexity
A Laszka, A Gueye
Internet Mathematics 11 (6), 588-626, 2015
52015
The resilience of the internet to colluding country induced connectivity disruptions
P Mell, R Harang, A Gueye
Proceedings of the Workshop on Security of Emerging Networking Technologies, 2015
52015
Quantifying All-to-One network topology robustness under budget constraints
A Laszka, A Gueye
ACM SIGMETRICS Performance Evaluation Review 41 (4), 8-11, 2014
52014
A convex upper bound on the log-partition function for binary graphical models
L El Ghaoui, A Gueye
Proc. NIPS, 2008
42008
A convex upper bound on the log-partition function for binary graphical models
L El Ghaoui, A Gueye
Proc. NIPS, 2008
42008
A suite of metrics for calculating the most significant security relevant software flaw types
P Mell, A Gueye
2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020
32020
Poster: Proposal of an Intelligent Remote Tutoring Model
B Gueye, AD Gueye, A Gueye, O Kasse, C Lishou
Interactive Mobile Communication, Technologies and Learning, 297-306, 2019
32019
Africa’s online access: what data is getting accessed and where it is hosted?
B Mbaye, A Gueye, D Banse, A Diop
International Conference on Innovations and Interdisciplinary Solutions for …, 2019
32019
A Decade of Reoccurring Software Weaknesses
A Gueye, CEC Galhardo, I Bojanova, P Mell
IEEE Security & Privacy 19 (6), 74-82, 2021
22021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20