Design of network topology in an adversarial environment A Gueye, JC Walrand, V Anantharam Decision and Game Theory for Security: First International Conference …, 2010 | 52 | 2010 |
A game theoretical approach to communication security A Gueye University of California, Berkeley, 2011 | 39 | 2011 |
How to choose communication links in an adversarial environment? A Gueye, JC Walrand, V Anantharam Game Theory for Networks: 2nd International ICST Conference, GAMENETS 2011 …, 2012 | 36 | 2012 |
Towards a metric for communication network vulnerability to attacks: A game theoretic approach A Gueye, V Marbukh, JC Walrand Game Theory for Networks: Third International ICST Conference, GameNets 2012 …, 2012 | 29 | 2012 |
A game-theoretic framework for network security vulnerability assessment and mitigation A Gueye, V Marbukh International Conference on Decision and Game Theory for Security, 186-200, 2012 | 27 | 2012 |
Security in networks: A game-theoretic approach A Gueye, JC Walrand 2008 47th IEEE Conference on Decision and Control, 829-834, 2008 | 18 | 2008 |
Measurements of the most significant software security weaknesses CC Galhardo, P Mell, I Bojanova, A Gueye Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 16 | 2020 |
Network design game with both reliability and security failures GA Schwartz, S Amin, A Gueye, J Walrand 2011 49th Annual Allerton Conference on Communication, Control, and …, 2011 | 13 | 2011 |
Quantifying network topology robustness under budget constraints: General model and computational complexity A Laszka, A Gueye Decision and Game Theory for Security: 4th International Conference, GameSec …, 2013 | 11 | 2013 |
A Historical and Statistical Studyof the Software Vulnerability Landscape A Gueye, P Mell arXiv preprint arXiv:2102.01722, 2021 | 8 | 2021 |
A decade of reoccurring software weaknesses A Gueye, CEC Galhardo, I Bojanova, P Mell IEEE security & privacy 19 (6), 74-82, 2021 | 7 | 2021 |
Network topology vulnerability/cost trade-off: Model, application, and computational complexity A Laszka, A Gueye Internet Mathematics 11 (6), 588-626, 2015 | 7 | 2015 |
Quantifying All-to-One network topology robustness under budget constraints A Laszka, A Gueye ACM SIGMETRICS Performance Evaluation Review 41 (4), 8-11, 2014 | 6 | 2014 |
Africa’s online access: what data is getting accessed and where it is hosted? B Mbaye, A Gueye, D Banse, A Diop Innovations and Interdisciplinary Solutions for Underserved Areas: Third EAI …, 2019 | 5 | 2019 |
On the prevalence of Boomerang Routing in Africa: Analysis and potential solutions A Gueye, B Mbaye Innovations and Interdisciplinary Solutions for Underserved Areas: Second …, 2018 | 5 | 2018 |
The resilience of the internet to colluding country induced connectivity disruptions P Mell, R Harang, A Gueye Proceedings of 1st Workshop on Security of Emerging Networking Technologies …, 2015 | 5 | 2015 |
A suite of metrics for calculating the most significant security relevant software flaw types P Mell, A Gueye 2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020 | 4 | 2020 |
A convex upper bound on the log-partition function for binary graphical models L El Ghaoui, A Gueye Proc. NIPS, 2008 | 4 | 2008 |
Poster: Proposal of an Intelligent Remote Tutoring Model B Gueye, AD Gueye, A Gueye, O Kasse, C Lishou Internet of Things, Infrastructures and Mobile Applications: Proceedings of …, 2021 | 3 | 2021 |
An Opportunistic Connectivity Network for Rural Areas in Senegal A Gueye, C Mahmoudi, OI Elmimouni, ML Gueye, SO Ndiaye Innovation and Interdisciplinary Solutions for Underserved Areas: First …, 2018 | 3 | 2018 |