Follow
Assane Gueye
Assane Gueye
Assistant Teaching Professor
Verified email at andrew.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Design of network topology in an adversarial environment
A Gueye, JC Walrand, V Anantharam
Decision and Game Theory for Security: First International Conference …, 2010
482010
A game theoretical approach to communication security
A Gueye
University of California, Berkeley, 2011
382011
How to choose communication links in an adversarial environment?
A Gueye, JC Walrand, V Anantharam
Game Theory for Networks: 2nd International ICST Conference, GAMENETS 2011 …, 2012
332012
Towards a metric for communication network vulnerability to attacks: A game theoretic approach
A Gueye, V Marbukh, JC Walrand
Game Theory for Networks: Third International ICST Conference, GameNets 2012 …, 2012
282012
A game-theoretic framework for network security vulnerability assessment and mitigation
A Gueye, V Marbukh
Decision and Game Theory for Security: Third International Conference …, 2012
222012
Security in networks: A game-theoretic approach
A Gueye, JC Walrand
2008 47th IEEE Conference on Decision and Control, 829-834, 2008
172008
Network design game with both reliability and security failures
GA Schwartz, S Amin, A Gueye, J Walrand
2011 49th Annual Allerton Conference on Communication, Control, and …, 2011
132011
Quantifying network topology robustness under budget constraints: General model and computational complexity
A Laszka, A Gueye
Decision and Game Theory for Security: 4th International Conference, GameSec …, 2013
102013
Measurements of the most significant software security weaknesses
CC Galhardo, P Mell, I Bojanova, A Gueye
Annual Computer Security Applications Conference, 154-164, 2020
62020
Network topology vulnerability/cost trade-off: Model, application, and computational complexity
A Laszka, A Gueye
Internet Mathematics 11 (6), 588-626, 2015
52015
The resilience of the internet to colluding country induced connectivity disruptions
P Mell, R Harang, A Gueye
Proceedings of the Workshop on Security of Emerging Networking Technologies, 2015
52015
Quantifying All-to-One network topology robustness under budget constraints
A Laszka, A Gueye
ACM SIGMETRICS Performance Evaluation Review 41 (4), 8-11, 2014
52014
A Historical and Statistical Studyof the Software Vulnerability Landscape
A Gueye, P Mell
arXiv preprint arXiv:2102.01722, 2021
42021
A suite of metrics for calculating the most significant security relevant software flaw types
P Mell, A Gueye
2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020
42020
Africa’s online access: what data is getting accessed and where it is hosted?
B Mbaye, A Gueye, D Banse, A Diop
Innovations and Interdisciplinary Solutions for Underserved Areas: Third EAI …, 2019
42019
A convex upper bound on the log-partition function for binary graphical models
L El Ghaoui, A Gueye
Proc. NIPS, 2008
42008
A convex upper bound on the log-partition function for binary graphical models
L El Ghaoui, A Gueye
Proc. NIPS, 2008
42008
Poster: Proposal of an Intelligent Remote Tutoring Model
B Gueye, AD Gueye, A Gueye, O Kasse, C Lishou
Internet of Things, Infrastructures and Mobile Applications: Proceedings of …, 2021
32021
Innovations and Interdisciplinary Solutions for Underserved Areas: Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14–15, 2019, Proceedings
G Bassioni, CMF Kebe, A Gueye, A Ndiaye
Springer Nature, 2019
32019
On the prevalence of Boomerang Routing in Africa: Analysis and potential solutions
A Gueye, B Mbaye
Innovations and Interdisciplinary Solutions for Underserved Areas: Second …, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20