Dr Rolando Trujillo Rasua

STAFF PROFILE

Position

Lecturer in Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

Publications

Filter by

2017

Similarities and differences between the vertex cover number and the weakly connected domination number of a graph

M Lemaska, J Rodríguez-Velázquez, R Trujillo Rasua

(2017), Vol. 152, pp. 273-287, Fundamenta informaticae, Amsterdam, The Netherlands, C1-1

journal

Refinement-aware generation of attack trees

O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, T Willemse

(2017), pp. 164-179, STM 2017 : Security and trust management : 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings, Oslo, Norway, E1-1

conference

Man-in-the-middle attacks evolved... but our security models didn't

H Jonker, S Mauw, R Trujillo-Rasua

(2017), Vol. 10368, pp. 19-25, Security protocols XXIV : Proceedings of the 24th International Workshop, Brno, Czech Republic, E1-1

conference

Optimality results on the security of lookup-based protocols

S Mauw, J Toro-Pozo, R Trujillo-Rasua

(2017), pp. 137-150, Radio frequency identification and IoT security : 12th International Workshop, RFIDsec 2016, Hong Kong, China, November 30 - December 2, 2016, revised selected papers, Hong Kong, China, E1-1

conference
2016

Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0

O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua

(2016), pp. 159-162, QEST 2016 : Quantitative evaluation of systems : 13th International Conference, QEST 2016, Quebec City, QC, Canada, August 23-25, 2016, Proceedings, Que?bec City, Que?bec, E1-1

conference

A class of precomputation-based distance-bounding protocols

S Mauw, J Toro-Pozo, R Trujillo-Rasua

(2016), pp. 97-111, EuroS&P 2016 : 2016 IEEE European Symposium on Security and Privacy : proceedings : 21-24 March 2016, Saarbruecken, Germany, Saarbru?cken, Germany, E1-1

conference

k-Metric antidimension: a privacy measure for social graphs

R Trujillo Rasua, I Yero

(2016), Vol. 328, pp. 403-417, Information sciences, Amsterdam, The Netherlands, C1-1

journal

Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study

M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua

(2016), pp. 326-334, PoEM 2016 : The practice of enterprise modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Sko?vde, Sweden, November 8-10, 2016, Proceedings, Skovde, Sweden, E1-1

conference

Characterizing 1-metric antidimensional trees and unicyclic graphs

R Trujillo Rasua, I Yero

(2016), Vol. 59, pp. 1264-1273, Computer journal, Oxford, Eng., C1-1

journal

Counteracting active attacks in social network graphs

S Mauw, R Trujillo-Rasua, B Xuan

(2016), pp. 233-248, DBSec 2016 : Data and applications security and privacy XXX : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2015. Proceedings, Trento, Italy, E1-1

conference

The fréchet/manhattan distance and the trajectory anonymisation problem

C Torres, R Trujillo-Rasua

(2016), pp. 19-34, DBSec 2016 : Data and applications security and privacy XXX : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2015. Proceedings, Trento, Italy, E1-1

conference
2015

Attack trees with sequential conjunction

R Jhawar, B Kordy, S Mauw, S Radomirovi?, R Trujillo-Rasua

(2015), pp. 339-353, ICT systems security and privacy protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings, Hamburg, Germany, E1-1

conference

Comparing distance bounding protocols: a critical mission supported by decision theory

G Avoine, S Mauw, R Trujillo Rasua

(2015), Vol. 67, pp. 92-102, Computer communications, Amsterdam, The Netherlands, C1-1

journal
2014

Distance bounding facing both mafia and distance frauds

R Trujillo Rasua, B Martin, G Avoine

(2014), Vol. 13, pp. 5690-5698, IEEE transactions on wireless communications, Piscataway, N.J., C1-1

journal
2013

On the privacy offered by (k, ?)-anonymity

R Trujillo-Rasua, J Domingo-Ferrer

(2013), Vol. 38, pp. 491-494, Information systems, Amsterdam, The Netherlands, C1-1

journal
2012

Microaggregation- and permutation-based anonymization of movement data

J Domingo-Ferrer, R Trujillo Rasua

(2012), Vol. 208, pp. 55-80, Information sciences, Amsterdam, The Netherlands, C1-1

journal

Predictive protocol for the scalable identification of RFID tags through collaborative readers

R Trujillo Rasua, A Solanas, P Pérez-Martínez, J Domingo-Ferrer

(2012), Vol. 63, pp. 557-573, Computers in industry, Amsterdam, The Netherlands, C1-1

journal
2011

Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers

R Trujillo Rasua, A Solanas

(2011), Vol. 55, pp. 3211-3223, Computer networks, Amsterdam, The Netherlands, C1-1

journal

Funded Projects at Deakin

No Funded Projects at Deakin found

Supervisions

No completed student supervisions to report