-
3
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
M. Yilin, et al, "Cyber-Physical Security of a Smart Grid Infrastructure," Proceedings of the IEEE, Vol. 100, pp. 195-209, 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
, pp. 195-209
-
-
Yilin, M.1
-
5
-
-
33745468784
-
Wireless sensor network denial of sleep attack
-
IAW '05. Proceedings from the Sixth Annual IEEE SMC
-
M. Brownfield, et al, "Wireless sensor network denial of sleep attack," in Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC, 2005, pp. 356-364.
-
(2005)
Information Assurance Workshop, 2005
, pp. 356-364
-
-
Brownfield, M.1
-
6
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
presented at the Alexandria, Virginia, USA
-
A. Dinaburg, et al, "Ether: malware analysis via hardware virtualization extensions," presented at the Proceedings of the 15th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2008.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
-
-
Dinaburg, A.1
-
7
-
-
85156147536
-
Impeding malware analysis using conditional code obfuscation
-
M. I. Sharif, et al, "Impeding Malware Analysis Using Conditional Code Obfuscation," in NDSS'08, 2008.
-
(2008)
NDSS'08
-
-
Sharif, M.I.1
-
8
-
-
34047110218
-
Toward automated dynamic malware analysis using CWSandbox
-
C. Willems, et al, "Toward Automated Dynamic Malware Analysis Using CWSandbox," Security & Privacy, IEEE, Vol. 5, pp. 32-39, 2007.
-
(2007)
Security & Privacy, IEEE
, vol.5
, pp. 32-39
-
-
Willems, C.1
-
9
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
SP'07. IEEE Symposium on
-
A. Moser, et al, "Exploring Multiple Execution Paths for Malware Analysis," in Security and Privacy, 2007. SP'07. IEEE Symposium on, 2007, pp. 231-245.
-
(2007)
Security and Privacy, 2007
, pp. 231-245
-
-
Moser, A.1
-
12
-
-
84866521231
-
Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic
-
ISI 2008. IEEE International Conference on
-
B. Thuraisingham, "Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic," in Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on, 2008, pp. xxix-xxx.
-
(2008)
Intelligence and Security Informatics, 2008
, pp. xxix-xxx
-
-
Thuraisingham, B.1
-
14
-
-
84863028103
-
Data-provenance verification for secure hosts
-
K. Xu, et al, "Data-Provenance Verification For Secure Hosts," IEEE Trans. Dependable Secur. Comput., Vol. 9, pp. 173-183, 2012.
-
(2012)
IEEE Trans. Dependable Secur. Comput.
, vol.9
, pp. 173-183
-
-
Xu, K.1
-
15
-
-
0003484888
-
-
PhD Thesis, Stanford University, Stanford, CA, USA
-
P. Gupta, "Algorithms for routing lookups and packet classification," PhD Thesis, Stanford University, Stanford, CA, USA, 2000.
-
(2000)
Algorithms for Routing Lookups and Packet Classification
-
-
Gupta, P.1
-
16
-
-
49349096759
-
Diverse firewall design
-
IEEE Transactions on
-
A. X. Liu and M. G. Gouda, "Diverse Firewall Design," Parallel and Distributed Systems, IEEE Transactions on, Vol. 19, pp. 1237-1251, 2008.
-
(2008)
Parallel and Distributed Systems
, vol.19
, pp. 1237-1251
-
-
Liu, A.X.1
Gouda, M.G.2
-
18
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
ICDCS '08. 28th International Conference on
-
A. A. Cardenas, et al, "Secure Control: Towards Survivable Cyber-Physical Systems," in Distributed Computing Systems Workshops, 2008. ICDCS '08. 28th International Conference on, 2008, pp. 495-500.
-
(2008)
Distributed Computing Systems Workshops, 2008
, pp. 495-500
-
-
Cardenas, A.A.1
-
26
-
-
85192409176
-
Security for cyber-physical systems: Case studies with medical devices, robots, and automobiles
-
presented at the Tucson, Arizona, USA
-
T. Kohno, "Security for cyber-physical systems: case studies with medical devices, robots, and automobiles," presented at the Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, Arizona, USA, 2012.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks
-
-
Kohno, T.1
-
27
-
-
84867805516
-
Behavior rule based intrusion detection for supporting secure medical cyber physical systems
-
2012 21st International Conference on
-
R. Mitchell and I.-R. Chen, "Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems," in Computer Communications and Networks (ICCCN), 2012 21st International Conference on, 2012, pp. 1-7.
-
(2012)
Computer Communications and Networks (ICCCN)
, pp. 1-7
-
-
Mitchell, R.1
Chen, I.-R.2
-
28
-
-
80053414377
-
A hierarchical security architecture for cyber-physical systems
-
2011 4th International Symposium on
-
Z. Quanyan, et al, "A hierarchical security architecture for cyber-physical systems," in Resilient Control Systems (ISRCS), 2011 4th International Symposium on, 2011, pp. 15-20.
-
(2011)
Resilient Control Systems (ISRCS)
, pp. 15-20
-
-
Quanyan, Z.1
-
29
-
-
35148897382
-
Detecting compromised nodes in wireless sensor networks
-
SNPD 2007. Eighth ACIS International Conference on, 2007
-
M. Mathews, et al, "Detecting Compromised Nodes in Wireless Sensor Networks," in Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on, 2007, pp. 273-278.
-
(2007)
Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
, pp. 273-278
-
-
Mathews, M.1
-
30
-
-
85192398956
-
-
M.S., Oklahoma State University, Oklahoma City, OK, USA
-
P. R. Nalabolu, "Detecting Malicious Code in Sensor Network Applications Using Petri Nets," M.S., Oklahoma State University, Oklahoma City, OK, USA, 2007.
-
(2007)
Detecting Malicious Code in Sensor Network Applications Using Petri Nets
-
-
Nalabolu, P.R.1
-
31
-
-
80052996550
-
Security requirements analysis, specification, prioritization and policy development in cyber-physical systems
-
2011 5th International Conference on
-
K. K. Fletcher and L. Xiaoqing, "Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems," in Secure Software Integration & Reliability Improvement Companion (SSIRI-C), 2011 5th International Conference on, 2011, pp. 106-113.
-
(2011)
Secure Software Integration & Reliability Improvement Companion (SSIRI-C)
, pp. 106-113
-
-
Fletcher, K.K.1
Xiaoqing, L.2
-
32
-
-
84857620651
-
Defense as a service cloud for cyber-physical systems
-
Applications and Worksharing (CollaborateCom), 2011 7th International Conference on
-
M. Azab and M. Eltoweissy, "Defense as a service cloud for Cyber-Physical Systems," in Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, 2011, pp. 392-401.
-
(2011)
Collaborative Computing: Networking
, pp. 392-401
-
-
Azab, M.1
Eltoweissy, M.2
-
33
-
-
81855183273
-
Cyber-physical systems security applied to telesurgical robotics
-
G. S. Lee and B. Thuraisingham, "Cyber-physical systems security applied to telesurgical robotics," Comput. Stand. Interfaces, Vol. 34, pp. 225-229, 2012.
-
(2012)
Comput. Stand. Interfaces
, vol.34
, pp. 225-229
-
-
Lee, G.S.1
Thuraisingham, B.2
|