Publications

189 result(s)

Conference papers/presentations

EPIC – An Electric Power Testbed for Research and Training in Cyber Physical Systems Security
Adepu S, Kandasamy N. K, and Mathur A, 2018, “EPIC – An Electric Power Testbed for Research and Training in Cyber Physical Systems Security,” Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS)

Journal papers

GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks
R.-H. Hsu, J. Lee, T. Q. S. Quek, and J.-C. Chen, 2018, “GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks,” IEEE Trans. Information Forensics, and Security, vol. 13, no. 2, pp. 449–464

Conference papers/presentations

Importance Sampling of Interval Markov Chains
Jegourel C, Wang J, Sun J, 2018, “Importance Sampling of Interval Markov Chains,” IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), https://ieeexplore.ieee.org/document/8416492

Conference papers/presentations

Integrated Safety and Cybersecurity Risk Analysis of Cooperative Intelligent Transport Systems
Sabaliauskaite G, Cui J, Liew L. S, and Zhou F, 2018, “Integrated Safety and Cybersecurity Risk Analysis of Cooperative Intelligent Transport Systems,” 10th International Conference on Soft Computing and Intelligent Systems (SCIS&ISIS)

Journal papers

Integrating Autonomous Vehicle Safety and Security Using the Six-Step Model
Sabaliauskaite G, Cui J, Liew L.S, 2018, “Integrating Autonomous Vehicle Safety and Security Using the Six-Step Model,” International Journal On Advances in Security

Conference papers/presentations

Learning from Mutants: Using Code Mutation to Learn and Monitor Cyber-Physical System Invariants
Chen Y, Poskitt C.M. , Sun J, 2018, “Learning from Mutants: Using Code Mutation to Learn and Monitor Cyber-Physical System Invariants,” IEEE Symposium on Security and Privacy

Journal papers

Lightweight and Practical Anonymous Authentication Protocol for RFID Systems using Physically Unclonable Functions
P. Gope, J. Lee, and T. Q. S. Quek, 2018, “Lightweight and Practical Anonymous Authentication Protocol for RFID Systems using Physically Unclonable Functions, IEEE Trans. Information Forensics, and Security, vol. 13, no. 11, pp. 2831–2843

Conference papers/presentations

Modeling Cyber-Physical Attacks on Water Networks with epanetCPA
R. Taormina, S. Galelli, H. C. Douglas, N.O. Tippenhauer, E. Salomons, and A. Ostfeld, 2018, “Modeling Cyber-Physical Attacks on Water Networks with epanetCPA,” 1st International WDSA / CCWI Joint Conference

Conference papers/presentations

Modelling Safe and Secure Cooperative Intelligent Transport Systems
Sabaliauskaite G, Cui J, Liew L.S, and Zhou F, 2018, “Modelling Safe and Secure Cooperative Intelligent Transport Systems,” 3rd Asia-Pacific Conference on Complex Systems Design and Management

Journal papers

N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders
Meidan, Y, Bohadana, M, Mathov, Y, Mirsky, Y, Breitenbacher, D, Shabati, A, Elovici, Y, 2018, “N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders”, IEEE Pervasive Computing, Special Issue – Securing the IoT