Design of network topology in an adversarial environment A Gueye, JC Walrand, V Anantharam Decision and Game Theory for Security: First International Conference …, 2010 | 48 | 2010 |
A game theoretical approach to communication security A Gueye University of California, Berkeley, 2011 | 38 | 2011 |
How to choose communication links in an adversarial environment? A Gueye, JC Walrand, V Anantharam Game Theory for Networks: 2nd International ICST Conference, GAMENETS 2011 …, 2012 | 33 | 2012 |
Towards a metric for communication network vulnerability to attacks: A game theoretic approach A Gueye, V Marbukh, JC Walrand Game Theory for Networks: Third International ICST Conference, GameNets 2012 …, 2012 | 28 | 2012 |
A game-theoretic framework for network security vulnerability assessment and mitigation A Gueye, V Marbukh Decision and Game Theory for Security: Third International Conference …, 2012 | 22 | 2012 |
Security in networks: A game-theoretic approach A Gueye, JC Walrand 2008 47th IEEE Conference on Decision and Control, 829-834, 2008 | 17 | 2008 |
Network design game with both reliability and security failures GA Schwartz, S Amin, A Gueye, J Walrand 2011 49th Annual Allerton Conference on Communication, Control, and …, 2011 | 13 | 2011 |
Quantifying network topology robustness under budget constraints: General model and computational complexity A Laszka, A Gueye Decision and Game Theory for Security: 4th International Conference, GameSec …, 2013 | 10 | 2013 |
Measurements of the most significant software security weaknesses CC Galhardo, P Mell, I Bojanova, A Gueye Annual Computer Security Applications Conference, 154-164, 2020 | 6 | 2020 |
Network topology vulnerability/cost trade-off: Model, application, and computational complexity A Laszka, A Gueye Internet Mathematics 11 (6), 588-626, 2015 | 5 | 2015 |
The resilience of the internet to colluding country induced connectivity disruptions P Mell, R Harang, A Gueye Proceedings of the Workshop on Security of Emerging Networking Technologies, 2015 | 5 | 2015 |
Quantifying All-to-One network topology robustness under budget constraints A Laszka, A Gueye ACM SIGMETRICS Performance Evaluation Review 41 (4), 8-11, 2014 | 5 | 2014 |
A Historical and Statistical Studyof the Software Vulnerability Landscape A Gueye, P Mell arXiv preprint arXiv:2102.01722, 2021 | 4 | 2021 |
A suite of metrics for calculating the most significant security relevant software flaw types P Mell, A Gueye 2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020 | 4 | 2020 |
Africa’s online access: what data is getting accessed and where it is hosted? B Mbaye, A Gueye, D Banse, A Diop Innovations and Interdisciplinary Solutions for Underserved Areas: Third EAI …, 2019 | 4 | 2019 |
A convex upper bound on the log-partition function for binary graphical models L El Ghaoui, A Gueye Proc. NIPS, 2008 | 4 | 2008 |
A convex upper bound on the log-partition function for binary graphical models L El Ghaoui, A Gueye Proc. NIPS, 2008 | 4 | 2008 |
Poster: Proposal of an Intelligent Remote Tutoring Model B Gueye, AD Gueye, A Gueye, O Kasse, C Lishou Internet of Things, Infrastructures and Mobile Applications: Proceedings of …, 2021 | 3 | 2021 |
Innovations and Interdisciplinary Solutions for Underserved Areas: Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14–15, 2019, Proceedings G Bassioni, CMF Kebe, A Gueye, A Ndiaye Springer Nature, 2019 | 3 | 2019 |
On the prevalence of Boomerang Routing in Africa: Analysis and potential solutions A Gueye, B Mbaye Innovations and Interdisciplinary Solutions for Underserved Areas: Second …, 2018 | 3 | 2018 |