Dr Rolando Trujillo Rasua

STAFF PROFILE

Position

Lecturer in Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

Publications

Filter by

2018

Anonymising social graphs in the presence of active attackers

S Mauw, Y Ramírez-Cruz, R Trujillo Rasua

(2018), Vol. 11, pp. 169-198, Transactions on Data Privacy, Catalonia, Spain, C1

journal
2017

Similarities and differences between the vertex cover number and the weakly connected domination number of a graph

M Lemaska, J Rodríguez-Velázquez, R Trujillo Rasua

(2017), Vol. 152, pp. 273-287, Fundamenta informaticae, Amsterdam, The Netherlands, C1-1

journal

Refinement-aware generation of attack trees

O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, T Willemse

(2017), pp. 164-179, STM 2017 : Security and trust management : 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings, Oslo, Norway, E1-1

conference

Man-in-the-middle attacks evolved... but our security models didn't

H Jonker, S Mauw, R Trujillo-Rasua

(2017), Vol. 10368, pp. 19-25, Security protocols XXIV : Proceedings of the 24th International Workshop, Brno, Czech Republic, E1-1

conference

Optimality results on the security of lookup-based protocols

S Mauw, J Toro-Pozo, R Trujillo-Rasua

(2017), pp. 137-150, Radio frequency identification and IoT security : 12th International Workshop, RFIDsec 2016, Hong Kong, China, November 30 - December 2, 2016, revised selected papers, Hong Kong, China, E1-1

conference
2016

Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0

O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua

(2016), pp. 159-162, QEST 2016 : Quantitative evaluation of systems : 13th International Conference, QEST 2016, Quebec City, QC, Canada, August 23-25, 2016, Proceedings, Que?bec City, Que?bec, E1-1

conference

A class of precomputation-based distance-bounding protocols

S Mauw, J Toro-Pozo, R Trujillo-Rasua

(2016), pp. 97-111, EuroS&P 2016 : 2016 IEEE European Symposium on Security and Privacy : proceedings : 21-24 March 2016, Saarbruecken, Germany, Saarbru?cken, Germany, E1-1

conference

k-Metric antidimension: a privacy measure for social graphs

R Trujillo Rasua, I Yero

(2016), Vol. 328, pp. 403-417, Information sciences, Amsterdam, The Netherlands, C1-1

journal

Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study

M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua

(2016), pp. 326-334, PoEM 2016 : The practice of enterprise modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Sko?vde, Sweden, November 8-10, 2016, Proceedings, Skovde, Sweden, E1-1

conference

Characterizing 1-metric antidimensional trees and unicyclic graphs

R Trujillo Rasua, I Yero

(2016), Vol. 59, pp. 1264-1273, Computer journal, Oxford, Eng., C1-1

journal

Counteracting active attacks in social network graphs

S Mauw, R Trujillo-Rasua, B Xuan

(2016), pp. 233-248, DBSec 2016 : Data and applications security and privacy XXX : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2015. Proceedings, Trento, Italy, E1-1

conference

The fréchet/manhattan distance and the trajectory anonymisation problem

C Torres, R Trujillo-Rasua

(2016), pp. 19-34, DBSec 2016 : Data and applications security and privacy XXX : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2015. Proceedings, Trento, Italy, E1-1

conference
2015

Attack trees with sequential conjunction

R Jhawar, B Kordy, S Mauw, S Radomirovi?, R Trujillo-Rasua

(2015), pp. 339-353, ICT systems security and privacy protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings, Hamburg, Germany, E1-1

conference

Comparing distance bounding protocols: a critical mission supported by decision theory

G Avoine, S Mauw, R Trujillo Rasua

(2015), Vol. 67, pp. 92-102, Computer communications, Amsterdam, The Netherlands, C1-1

journal
2014

Distance bounding facing both mafia and distance frauds

R Trujillo Rasua, B Martin, G Avoine

(2014), Vol. 13, pp. 5690-5698, IEEE transactions on wireless communications, Piscataway, N.J., C1-1

journal
2013

On the privacy offered by (k, ?)-anonymity

R Trujillo-Rasua, J Domingo-Ferrer

(2013), Vol. 38, pp. 491-494, Information systems, Amsterdam, The Netherlands, C1-1

journal
2012

Microaggregation- and permutation-based anonymization of movement data

J Domingo-Ferrer, R Trujillo Rasua

(2012), Vol. 208, pp. 55-80, Information sciences, Amsterdam, The Netherlands, C1-1

journal

Predictive protocol for the scalable identification of RFID tags through collaborative readers

R Trujillo Rasua, A Solanas, P Pérez-Martínez, J Domingo-Ferrer

(2012), Vol. 63, pp. 557-573, Computers in industry, Amsterdam, The Netherlands, C1-1

journal
2011

Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers

R Trujillo Rasua, A Solanas

(2011), Vol. 55, pp. 3211-3223, Computer networks, Amsterdam, The Netherlands, C1-1

journal

Funded Projects at Deakin

No Funded Projects at Deakin found

Supervisions

No completed student supervisions to report