Publications

189 result(s)

Conference papers/presentations

Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS
Ahmed C. M, Zhou J, Mathur P., 2018, “Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS,” Annual Computer Security Applications Conference (ACSAC)

Conference papers/presentations

NoisePrint – Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
Ahmed C. M, Ochoa M, Zhou J, Qadeer M, Murguia C, Ruths J, Mathur A, 2018, “NoisePrint – Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems,” ACM Asia Conference on Computer and Communications Security (ASIACCS)

Conference papers/presentations

On the Sequential Massart Algorithm for Statistical Model Checking
Jegourel C, Sun J, and Dong J. S, 2018, “On the Sequential Massart Algorithm for Statistical Model Checking,” International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA), Limassol, Cyprus

Journal papers

Optimal Placement of Imperfect Water Quality Sensors in Water Distribution Networks
de Winter C, Palleti V. R, Worm D, Kooij R, 2018, “Optimal Placement of Imperfect Water Quality Sensors in Water Distribution Networks,” Computers & Chemical Engineering

Conference papers/presentations

Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things
Setikere, S, Sachidananda, V, Elovici, Y,, 2018, “Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things”, 14th EAI International Conference on Security and Privacy in Communication Networks

Journal papers

Pressure-driven Modeling of Cyber-Physical Attacks on Water Distribution Systems
Douglas H. C, Taormina R, Galelli S, 2018, “Pressure-driven Modeling of Cyber-Physical Attacks on Water Distribution Systems,” Journal of Water Resources Planning and Management

Journal papers

Reconfigurable Security: Edge Computing-based Framework for IoT
R.-H. Hsu, J. Lee, T. Q. S. Quek, and J.-C. Chen, 2018, “Reconfigurable Security: Edge Computing-based Framework for IoT,” IEEE Network Mag, vol. 32, no. 5, pp. 92–99

Conference papers/presentations

Rethinking Blockchain Security: Position Paper
Vincent Chia, Pieter Hartely, Qingze Humy, Sebastian Ma, Georgios Piliourasy, Daniel Reijsbergeny, Mark van Staalduinen, Pawel Szalachowskiy, 2018, “Rethinking Blockchain Security: Position Paper”, IEEE International Conference on Blockchain

Journal papers

Security Testbed for Internet of Things Devices
Siboni, S, Sachidananda, V, Meidan, Y, Bohadana, M, Shabatia, A, Elovici Y, 2018, “Security Testbed for Internet of Things Devices”, IEEE Transactions on Reliability

Conference papers/presentations

Short Paper: On Practical Threat Scenario Testing in an Electric Power ICS Testbed
Siddiqi A, Tippenhauer N.O, Mashima D, Chen B, 2018, “Short Paper: On Practical Threat Scenario Testing in an Electric Power ICS Testbed,” 4th ACM Cyber‐Physical System Security Workshop (ACM CPSS’18)