Follow
Assane Gueye
Assane Gueye
Associate Teaching Professor
Verified email at andrew.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Design of network topology in an adversarial environment
A Gueye, JC Walrand, V Anantharam
Decision and Game Theory for Security: First International Conference …, 2010
522010
A game theoretical approach to communication security
A Gueye
University of California, Berkeley, 2011
392011
How to choose communication links in an adversarial environment?
A Gueye, JC Walrand, V Anantharam
Game Theory for Networks: 2nd International ICST Conference, GAMENETS 2011 …, 2012
352012
Towards a metric for communication network vulnerability to attacks: A game theoretic approach
A Gueye, V Marbukh, JC Walrand
Game Theory for Networks: Third International ICST Conference, GameNets 2012 …, 2012
292012
A game-theoretic framework for network security vulnerability assessment and mitigation
A Gueye, V Marbukh
International Conference on Decision and Game Theory for Security, 186-200, 2012
272012
Security in networks: A game-theoretic approach
A Gueye, JC Walrand
2008 47th IEEE Conference on Decision and Control, 829-834, 2008
182008
Measurements of the most significant software security weaknesses
CC Galhardo, P Mell, I Bojanova, A Gueye
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
142020
Network design game with both reliability and security failures
GA Schwartz, S Amin, A Gueye, J Walrand
2011 49th Annual Allerton Conference on Communication, Control, and …, 2011
132011
Quantifying network topology robustness under budget constraints: General model and computational complexity
A Laszka, A Gueye
Decision and Game Theory for Security: 4th International Conference, GameSec …, 2013
112013
A Historical and Statistical Studyof the Software Vulnerability Landscape
A Gueye, P Mell
arXiv preprint arXiv:2102.01722, 2021
72021
Network topology vulnerability/cost trade-off: Model, application, and computational complexity
A Laszka, A Gueye
Internet Mathematics 11 (6), 588-626, 2015
72015
A decade of reoccurring software weaknesses
A Gueye, CEC Galhardo, I Bojanova, P Mell
IEEE security & privacy 19 (6), 74-82, 2021
62021
Quantifying All-to-One network topology robustness under budget constraints
A Laszka, A Gueye
ACM SIGMETRICS Performance Evaluation Review 41 (4), 8-11, 2014
62014
Africa’s online access: what data is getting accessed and where it is hosted?
B Mbaye, A Gueye, D Banse, A Diop
Innovations and Interdisciplinary Solutions for Underserved Areas: Third EAI …, 2019
52019
On the prevalence of Boomerang Routing in Africa: Analysis and potential solutions
A Gueye, B Mbaye
Innovations and Interdisciplinary Solutions for Underserved Areas: Second …, 2018
52018
The resilience of the internet to colluding country induced connectivity disruptions
P Mell, R Harang, A Gueye
Proceedings of 1st Workshop on Security of Emerging Networking Technologies …, 2015
52015
A suite of metrics for calculating the most significant security relevant software flaw types
P Mell, A Gueye
2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020
42020
A convex upper bound on the log-partition function for binary graphical models
L El Ghaoui, A Gueye
Proc. NIPS, 2008
42008
A convex upper bound on the log-partition function for binary graphical models
L El Ghaoui, A Gueye
Proc. NIPS, 2008
42008
Poster: Proposal of an Intelligent Remote Tutoring Model
B Gueye, AD Gueye, A Gueye, O Kasse, C Lishou
Internet of Things, Infrastructures and Mobile Applications: Proceedings of …, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20