Publications
Filters
189 result(s)
Conference papers/presentations
An Investigation into the Response of a Water Treatment System to Cyber Attacks
Adepu S. and Mathur A, 2017, “An Investigation into the Response of a Water Treatment System to Cyber Attacks,” The 17th IEEE International Symposium on High Assurance Systems Engineering (HASE)
Conference papers/presentations
Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning
Inoue J. , Yamagata Y, Chen Y, Poskitt C.M, and Sun J, 2017, “Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning,” IEEE International Conference on Data Mining Workshops: Data Mining for Cyberphysical and Industrial Systems (DMCIS)
Conference papers/presentations
Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks
Goh, Adepu S, Tan M. and Lee Z. S, 2017, ”Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks”, Workshop on Security issues in Cyber Physical Systems (SecCPS) @ HASE
Journal papers
Characterizing cyber-pysical attacks on water distribution systems
Taormina R, Galelli S, Tippenhauer N. O, Salomons E, Ostfeld A, 2017, “Characterizing cyber-pysical attacks on water distribution systems,” Journal of Water Resources Planning and Management
Journal papers
Collaborative Load Management with Safety Assurance in Smart Grids
Tan R, Nguyen H. H, Yau D. K. Y, 2017, “Collaborative Load Management with Safety Assurance in Smart Grids,” ACM Transactions on Cyber-Physical Systems, http://people.sutd.edu.sg/~david_yau/publications/tan2017tcps.pdf
Journal papers
Cyber Security Patrol – Detecting Fake and Vulnerable WiFi-Enabled Printers
Elovici Y, Toh, J, 2017, “Cyber Security Patrol – Detecting Fake and Vulnerable WiFi-Enabled Printers”, The 32nd ACM Symposium on Applied Computing (ACM SAC), pp. 535- 542
Journal papers
Detection of Unauthorized IoT Devices Using Machine Learning Techniques
Meidan, Y, Bohadana, M, Shabtai, A, Ochoa, M, Tippenhauer, N. O, Davis Guarnizo, J, Elovici, Y, 2017, “Detection of Unauthorized IoT Devices Using Machine Learning Techniques”, https://arxiv.org/abs/1709.04647
Conference papers/presentations
Effectiveness of Association Rules Mining for Invariants Generation in Cyber-Physical Systems
Pal K, Adepu S, Goh J, 2017, ”Effectiveness of Association Rules Mining for Invariants Generation in Cyber-Physical Systems “, The 18th IEEE International Symposium on High Assurance Systems Engineering (HASE)
Journal papers
Exploiting Trust Degree for Multiple-Antenna User Cooperation
M.Zhao, J. Ryu, J. Lee, T. Q. S. Quek, and S. Feng, 2017, “Exploiting Trust Degree for Multiple-Antenna User Cooperation,” IEEE Transactions on Wireless Communications
Journal papers
Friends or foes – the design of confidential cooperative communication with untrustworthy relay
J.Lee, J. Ryu, C. D. T. Thai, J. Wang, F. Wang, and T. Q. S. Quek, 2017, “Friends or foes – the design of confidential cooperative communication with untrustworthy relay,” IEEE Commun