Publications

189 result(s)

Conference papers/presentations

An Investigation into the Response of a Water Treatment System to Cyber Attacks
Adepu S. and Mathur A, 2017, “An Investigation into the Response of a Water Treatment System to Cyber Attacks,” The 17th IEEE International Symposium on High Assurance Systems Engineering (HASE)

Conference papers/presentations

Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning
Inoue J. , Yamagata Y, Chen Y, Poskitt C.M, and Sun J, 2017, “Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning,” IEEE International Conference on Data Mining Workshops: Data Mining for Cyberphysical and Industrial Systems (DMCIS)

Conference papers/presentations

Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks
Goh, Adepu S, Tan M. and Lee Z. S, 2017, ”Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks”, Workshop on Security issues in Cyber Physical Systems (SecCPS) @ HASE

Journal papers

Characterizing cyber-pysical attacks on water distribution systems
Taormina R, Galelli S, Tippenhauer N. O, Salomons E, Ostfeld A, 2017, “Characterizing cyber-pysical attacks on water distribution systems,” Journal of Water Resources Planning and Management

Journal papers

Collaborative Load Management with Safety Assurance in Smart Grids
Tan R, Nguyen H. H, Yau D. K. Y, 2017, “Collaborative Load Management with Safety Assurance in Smart Grids,” ACM Transactions on Cyber-Physical Systems, http://people.sutd.edu.sg/~david_yau/publications/tan2017tcps.pdf

Journal papers

Cyber Security Patrol – Detecting Fake and Vulnerable WiFi-Enabled Printers
Elovici Y, Toh, J, 2017, “Cyber Security Patrol – Detecting Fake and Vulnerable WiFi-Enabled Printers”, The 32nd ACM Symposium on Applied Computing (ACM SAC), pp. 535- 542

Journal papers

Detection of Unauthorized IoT Devices Using Machine Learning Techniques
Meidan, Y, Bohadana, M, Shabtai, A, Ochoa, M, Tippenhauer, N. O, Davis Guarnizo, J, Elovici, Y, 2017, “Detection of Unauthorized IoT Devices Using Machine Learning Techniques”, https://arxiv.org/abs/1709.04647

Conference papers/presentations

Effectiveness of Association Rules Mining for Invariants Generation in Cyber-Physical Systems
Pal K, Adepu S, Goh J, 2017, ”Effectiveness of Association Rules Mining for Invariants Generation in Cyber-Physical Systems “, The 18th IEEE International Symposium on High Assurance Systems Engineering (HASE)

Journal papers

Exploiting Trust Degree for Multiple-Antenna User Cooperation
M.Zhao, J. Ryu, J. Lee, T. Q. S. Quek, and S. Feng, 2017, “Exploiting Trust Degree for Multiple-Antenna User Cooperation,” IEEE Transactions on Wireless Communications

Journal papers

Friends or foes – the design of confidential cooperative communication with untrustworthy relay
J.Lee, J. Ryu, C. D. T. Thai, J. Wang, F. Wang, and T. Q. S. Quek, 2017, “Friends or foes – the design of confidential cooperative communication with untrustworthy relay,” IEEE Commun