The ponder policy specification language N Damianou, N Dulay, E Lupu, M Sloman Policies for Distributed Systems and Networks, 18-38, 2001 | 1993 | 2001 |
Conflicts in policy-based distributed systems management EC Lupu, M Sloman IEEE Transactions on software engineering 25 (6), 852-869, 1999 | 952 | 1999 |
Towards poisoning of deep learning algorithms with back-gradient optimization L Muñoz-González, B Biggio, A Demontis, A Paudice, V Wongrassamee, ... Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017 | 685 | 2017 |
Automated dynamic analysis of ransomware: Benefits, limitations and use for detection D Sgandurra, L Muñoz-González, R Mohsen, EC Lupu arXiv preprint arXiv:1609.03020, 2016 | 367 | 2016 |
Using event calculus to formalise policy specification and analysis AK Bandara, EC Lupu, A Russo Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for …, 2003 | 282 | 2003 |
Security and management policy specification M Sloman, E Lupu IEEE network 16 (2), 10-19, 2002 | 260 | 2002 |
A goal-based approach to policy refinement AK Bandara, EC Lupu, J Moffett, A Russo Proceedings. Fifth IEEE International Workshop on Policies for Distributed …, 2004 | 252 | 2004 |
A policy deployment model for the ponder language N Dulay, E Lupu, M Sloman, N Damianou 2001 IEEE/IFIP International Symposium on Integrated Network Management …, 2001 | 236 | 2001 |
Conflict analysis for management policies E Lupu, M Sloman IFIP/IEEE International Symposium on Integrated Network Management, 1997 | 227 | 1997 |
An adaptive policy-based framework for network services management L Lymberopoulos, E Lupu, M Sloman Journal of Network and systems Management 11, 277-303, 2003 | 206 | 2003 |
Label sanitization against label flipping poisoning attacks A Paudice, L Muñoz-González, EC Lupu ECML PKDD 2018 Workshops: Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe …, 2019 | 176 | 2019 |
Towards a role-based framework for distributed systems management EC Lupu, M Sloman Journal of Network and Systems Management 5 (1), 5-30, 1997 | 169 | 1997 |
Detection of adversarial training examples in poisoning attacks through anomaly detection A Paudice, L Muñoz-González, A Gyorgy, EC Lupu arXiv preprint arXiv:1802.03041, 2018 | 168 | 2018 |
A survey of policy specification approaches N Damianou, A Bandara, M Sloman, E Lupu Department of Computing, Imperial College of Science Technology and Medicine …, 2002 | 165 | 2002 |
Ponder2: A policy system for autonomous pervasive environments K Twidle, N Dulay, E Lupu, M Sloman 2009 Fifth International Conference on Autonomic and Autonomous Systems, 330-335, 2009 | 147 | 2009 |
Byzantine-robust federated machine learning through adaptive model averaging L Muñoz-González, KT Co, EC Lupu arXiv preprint arXiv:1909.05125, 2019 | 142 | 2019 |
Indoor location estimation using multiple wireless technologies D Pandya, R Jain, E Lupu 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications …, 2003 | 142 | 2003 |
AMUSE: autonomic management of ubiquitous e‐Health systems E Lupu, N Dulay, M Sloman, J Sventek, S Heeps, S Strowes, K Twidle, ... Concurrency and Computation: Practice and Experience 20 (3), 277-295, 2008 | 137 | 2008 |
A policy based role object model E Lupu, M Sloman Proceedings First International Enterprise Distributed Object Computing …, 1997 | 130 | 1997 |
Tools for domain-based policy management of distributed systems N Damianou, N Dulay, E Lupu, M Sloman, T Tonouchi NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002 | 128 | 2002 |