Publications

189 result(s)

Journal papers

ICS-BlockOpS: Blockchain for Operational Data Security in Industrial Control System
Maw A, Adepu S. Mathur A, 2019, “ICS-BlockOpS: Blockchain for Operational Data Security in Industrial Control System,” Prevasive and Mobile Computing, Volume 59

Conference papers/presentations

Incentives in Ethereum’s Hybrid Casper Protocol
Vitalik Buterin, Daniel Reijsbergeny, Stefanos Leonardos, Georgios Piliouras, 2019, “Incentives in Ethereum’s Hybrid Casper Protocol”, IEEE International Conference on Blockchain and Cryptocurrency (ICBC)

Journal papers

Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences
Y. Chen, C.M. Poskitt, J. Sun, S. Adepu, and F. Zhang, 2019, “Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences,” 34th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2019, https://arxiv.org/abs/1909.05410

Journal papers

Machine Learning Invariants to Detect Anomalies in Secure Water Treatment (SWaT)
Jonathan Heng and Yoong Cheah Huei, 2019, “Machine Learning Invariants to Detect Anomalies in Secure Water Treatment (SWaT)”, International Conference on Machine Learning and Communications Systems (ICMLCS 2019), January 2019, 21(1), Part I, pp. 129-136

Conference papers/presentations

Oceanic games: Centralization risks and incentives in blockchain mining
Nikos Leonardos, Stefanos Leonardos, and Georgios Piliouras, 2019, Oceanic games: Centralization risks and incentives in blockchain mining, 1st International Conference on Mathematical Research for Blockchain Economy (MARBLE)

Conference papers/presentations

PIT: A Probe into Internet of Things by Comprehensive Security Analysis
Sachidananda, V, Bhairav, S, Ghosh N, Elovici, Y, 2019, “PIT: A Probe into Internet of Things by Comprehensive Security Analysis” The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom

Journal papers

Prosumer Site Power Interruption Attacks: Exploiting the Reactive Power Control Feature in Smart Inverters
Kandasamy N. K, 2019, “Prosumer Site Power Interruption Attacks: Exploiting the Reactive Power Control Feature in Smart Inverters,” IET Generation, Transmission and Distribution

Conference papers/presentations

Quantifying the Robustness of Network Controllability
Peng S, Kooij R, He Z, Mieghem P. V, 2019, “Quantifying the Robustness of Network Controllability,” 4th International Conference on System Reliability and Safety

Conference papers/presentations

Robust Stabilization of Resource Limited Networked Control Systems Under Denial-of-Service Attack
Tripathy N. S, Chamanbaz M. and Bouffanais R, 2019, “Robust Stabilization of Resource Limited Networked Control Systems Under Denial-of-Service Attack,” 58th IEEE Conference on Decision and Control

Journal papers

Secret Group-Key Generation at Physical Layer for Multi- Antenna Mesh Topology
T. Chan, J. Lee, J. Prakash, and T. Q. S. Quek, 2019, “Secret Group-Key Generation at Physical Layer for Multi- Antenna Mesh Topology,” IEEE Trans. Information Forensics, and Security, vol. 14, no. 1, pp. 18–33, vol. 14, no. 1, 18–33