Publications

189 result(s)

Conference papers/presentations

SMuF: State Machine Based Mutational Fuzzing for Internet of Things
Neeraj, K, Sachidananda, V, Setikere, S, Zhou, J. Elovici, Y, 2018, “SMuF: State Machine Based Mutational Fuzzing for Internet of Things”, the 13th edition of the International Conference on Critical Information Infrastructures Security (CRITIS)

Conference papers/presentations

TABOR – A Graphical Framework for Anomaly Detection in Industrial Control Systems
Lin Q, Adepu S, Verwer S. and Mathur A, 2018, “TABOR – A Graphical Framework for Anomaly Detection in Industrial Control Systems,” ACM Asia Conference on Computer and Communications Security (ASIACCS)

Conference papers/presentations

Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot
Antonioli D, Bernieri G, Tippenhauer N. O, 2018, “Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot” Asia CCM Conference on Computer & Communications Security

Journal papers

The Battle of the Attack Detection Algorithms: Disclosing Cyber Attacks on Water Distribution Networks
Taormina R, Galelli S, Tippenhauer N. O, Salomons E, Ostfeld A, Eliades D. G. , Aghashahi M, Sundararajan R, Pourahmadi M, Banks M/ K, Brentan B. M. , Campbell E, Lima G, Manzi D, Ayala-Cabrera D, Herrera M, Montalvo I, Izquierdo J, Luvizotto Jr. E. , Chandy S. E, Rasekh A, Zachary A. B, Campbell B, Shafiee M. E. , Giacomoni M, Gatsis N, Taha A, Abokifa A. A. , Haddad K, Lo C. S, Biswas P, Pasha M. F. K. , Kc B. , Somasundaram S. L. , Housh M, Ohar Z, 2018, “The Battle of the Attack Detection Algorithms: Disclosing Cyber Attacks on Water Distribution Networks” Journal of Water Resources Planning and Management

Conference papers/presentations

Towards More Reliable Bitcoin Timestamps
Pawel Szalachowski, 2018, “Towards More Reliable Bitcoin Timestamps”, Crypto Valley Conference on Blockchain Technology

Conference papers/presentations

US2: An Unified Safety and Security Analysis Method for Autonomous Vehicles
Cui J, Sabaliauskaite G, 2018, “US2: An Unified Safety and Security Analysis Method for Autonomous Vehicles,” Future of Information and Communication Conference (FICC)

Conference papers/presentations

WADAC: Privacy-Preserving Anomaly Detectionand Attack Classificationon Wireless Traffic
Sridharan, R, Maiti, R, Tippenhauer, N, 2018, “WADAC: Privacy-Preserving Anomaly Detectionand Attack Classificationon Wireless Traffic” 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2018, Stockholm, Sweden

Conference papers/presentations

A Distributed Ellipsoid Algorithm for Uncertain Convex Problems: A Randomized Approach
Chamanbaz M, Notarstefano G, Bouffanais R, 2017, “A Distributed Ellipsoid Algorithm for Uncertain Convex Problems: A Randomized Approach,” 56th IEEE Conference on Decision and Control

Journal papers

A Formal Specification and Verification Framework for Timed Security Protocols
Li L, Jun S, and Dong J. S, 2017, “A Formal Specification and Verification Framework for Timed Security Protocols.” IEEE Transactions on Software Engineering, Issue 99

Conference papers/presentations

Access Control in Water Distribution Networks: A Case Study
Adepu S, Mishra G. and Mathur A, 2017, “Access Control in Water Distribution Networks: A Case Study”, 2017 IEEE International Conference on Software Quality, Reliability & Security