Current Research Information SysTem In Norway
 
 

 English version


 
Hovedside
Forskningsresultater/NVI
Forskere
Prosjekter
Forskningsenheter
Logg inn
Om Cristin
 
 
   
Eksporter til


Viser treff 1-50 av 112 << Forrige 1 2 3    Neste >>

2022
1 Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn.
Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466)). International Journal of Critical Infrastructure Protection 2022 ;Volum 36. s. -
NTNU Untitled
 
2021
2 Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn.
Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus. International Journal of Critical Infrastructure Protection 2021 ;Volum 35.
NTNU Untitled
 
3 Nweke, Livinus Obiora; Wolthusen, Stephen.
A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda. Lecture Notes in Networks and Systems 2021 ;Volum 254. s. 220-228
NTNU Untitled
 
4 Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian.
Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring. International Journal of Advanced Computer Science and Applications (IJACSA) 2021 ;Volum 12.(3) s. 23-30
NTNU Untitled
 
2020
5 Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen.
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols. I: 16th International Conference on the Design of Reliable Communication Networks DRCN 2020. IEEE conference proceedings 2020 ISBN 978-1-7281-6300-0. s. 1-8
NTNU Untitled
 
6 Nweke, Livinus Obiora; Wolthusen, Stephen.
A Review of Asset-Centric Threat Modelling Approaches. International Journal of Advanced Computer Science and Applications (IJACSA) 2020 ;Volum 11.(2) s. 1-6
NTNU Untitled
 
7 Nweke, Livinus Obiora; Wolthusen, Stephen.
Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection. Wirtschaftsinformatik 2020
NTNU Untitled
 
8 Nweke, Livinus Obiora; Wolthusen, Stephen.
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection. International Conference on Cyber Conflict, CYCON 2020
NTNU Untitled
 
9 Nweke, Livinus Obiora; Wolthusen, Stephen.
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model. I: 2020 IEEE Conference on Communications and Network Security (CNS). IEEE conference proceedings 2020 ISBN 978-1-7281-4760-4. s. 1-6
NTNU Untitled
 
10 Nweke, Livinus Obiora; Wolthusen, Stephen.
Resilience Analysis of Software-Defined Networks Using Queueing Networks. I: 2020 International Conference on Computing, Networking and Communications (ICNC). IEEE conference proceedings 2020 ISBN 978-1-7281-4905-9. s. 536-542
NTNU Untitled
 
11 Nweke, Livinus Obiora; Yeng, Prosper; Wolthusen, Stephen; Yang, Bian.
Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices. International Journal of Advanced Computer Science and Applications (IJACSA) 2020 ;Volum 11.(2) s. 683-690
NTNU Untitled
 
12 Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian.
Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice. International Journal of Advanced Computer Science and Applications (IJACSA) 2020 ;Volum 11.(11) s. 772-784
NTNU Untitled
 
13 Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian.
Legal requirements toward enhancing the security of medical devices. International Journal of Advanced Computer Science and Applications (IJACSA) 2020 ;Volum 11.(11) s. 666-675
NTNU Untitled
 
2019
14 Gul, Ammara; Wolthusen, Stephen.
In-cycle sequential topology faults and attacks: Effects on state estimation. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11260 LNCS. s. 17-28
NTNU Untitled
 
15 Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen.
Threat Analysis for Smart Homes. Future Internet 2019 ;Volum 11.(10) s. -
NTNU Untitled
 
16 Nweke, Livinus Obiora; Wolthusen, Stephen; Mancini, Luigi V..
A Framework for the Validation of Network Artifacts. Norsk Informasjonssikkerhetskonferanse (NISK) 2019 ;Volum 12. s. -
NTNU Untitled
 
2018
17 Wright, James G; Wolthusen, Stephen.
De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 10707 LNCS. s. 131-143
NTNU Untitled
 
18 Baiocco, Alessio; Wolthusen, Stephen.
Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol. IEEE Power & Energy Society General Meeting 2018 s. -
NTNU Untitled
 
19 Darwish, Salaheddin; Nouretdinov, Ilia; Wolthusen, Stephen.
A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 10898 LNCS. s. 146-157
NTNU Untitled
 
20 Gul, Ammara; Wolthusen, Stephen.
Error propagation after reordering attacks on hierarchical state estimation. IFIP Advances in Information and Communication Technology 2018 ;Volum 542. s. 67-79
NTNU Untitled
 
2017
21 Alcaraz, Cristina; Lopez, Javier; Wolthusen, Stephen.
OCPP Protocol: Security Threats and Challenges. IEEE Transactions on Smart Grid 2017 ;Volum 8.(5) s. 2452-2459
NTNU Untitled
 
22 Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph.
Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids. I: Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers. Springer 2017 ISBN 978-3-319-61436-6. s. 52-68
NTNU Untitled
 
23 Gkioulos, Vasileios; Risthein, Erko; Wolthusen, Stephen.
TACTICS: Validation of the security framework developed for tactical SOA. Journal of Information Security and Applications 2017 ;Volum 35. s. 96-105
NTNU Untitled
 
24 Gkioulos, Vasileios; Wolthusen, Stephen.
A Security Policy Infrastructure for Tactical Service Oriented Architectures. I: Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers. Springer 2017 ISBN 978-3-319-61436-6. s. 37-51
NTNU Untitled
 
25 Gkioulos, Vasileios; Wolthusen, Stephen.
Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures. Advances in Intelligent Systems and Computing 2017 ;Volum 461. s. 149-166
NTNU Untitled
 
26 Gkioulos, Vasileios; Wolthusen, Stephen.
Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017. Advances in Intelligent Systems and Computing 2017 ;Volum 611. s. 310-322
NTNU Untitled
 
27 Gkioulos, Vasileios; Wolthusen, Stephen.
Security Requirements for the Deployment of Services Across Tactical SOA. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10446 LNCS. s. 115-127
NTNU Untitled
 
28 Kayem, Anne V.D.M.; Meinel, Christoph; Wolthusen, Stephen.
A smart micro-grid architecture for resource constrained environments. Advanced Information Networking and Applications 2017 s. 857-864
NTNU Untitled
 
29 Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen.
Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids. I: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE (Institute of Electrical and Electronics Engineers) 2017 ISBN 978-1-5090-4297-5. s. 1380-1387
NTNU Untitled
 
30 Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen.
Power auctioning in resource constrained micro-grids: Cases of cheating. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10242 LNCS. s. 137-149
NTNU Untitled
 
31 Rigolin Ferreira Lopes, Roberto; Nieminen, Mikko; Viidanoja, Antti; Wolthusen, Stephen.
Reactive/Proactive Connectivity Management in a Tactical Service-Oriented Infrastructure. I: 2017 International Conference on Military Communications and Information Systems (ICMCIS); May 15-16, 2017; Oulu, Finland. IEEE Communications Society 2017 ISBN 978-1-5386-3858-3.
NTNU Untitled
 
32 Weldehawaryat, Goitom Kahsay; Ambassa, Pacome L.; Marufu, Anesu M.C.; Wolthusen, Stephen; Kayem, Anne V.D.M..
Decentralised scheduling of power consumption in micro-grids: Optimisation and security. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10166 LNCS. s. 69-86
NTNU Untitled
 
33 Wright, James G; Wolthusen, Stephen.
Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10242 LNCS. s. 239-251
NTNU Untitled
 
2016
34 Alcaraz, Cristina; Lopeza, Javier; Wolthusen, Stephen.
Policy enforcement system for secure interoperable control in distributed Smart Grid systems. Journal of Network and Computer Applications 2016 ;Volum 59. s. 301-314
NTNU Untitled
 
35 Almulla, Sameera; Iraqi, Youssef; Wolthusen, Stephen.
Inferring relevance and presence of evidence in service-oriented and SaaS architectures. Proceedings of the IEEE Symposium on Computers and Communications 2016 ;Volum 2016-February. s. 152-159
NTNU Untitled
 
36 Al-Mutairi, Abdulrahman; Wolthusen, Stephen.
MPLS Policy Target Recognition Network. Lecture Notes in Computer Science (LNCS) 2016 ;Volum 9572. s. 71-87
NTNU Untitled
 
37 Alwasel, Bader; Wolthusen, Stephen.
Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes. Lecture Notes in Computer Science (LNCS) 2016 ;Volum 9578. s. 105-119
NTNU Untitled
 
38 Alwasel, Bader; Wolthusen, Stephen.
Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use. I: Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers. Springer 2016 ISBN 978-3-319-31664-2. s. 293-307
NTNU Untitled
 
39 Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Cristoph.
Privacy Violations in Constrained Micro-grids: Adversarial Cases. I: Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016. IEEE 2016 ISBN 978-1-5090-1857-4. s. 601-606
NTNU Untitled
 
40 Baiocco, Alessio; Foglietta, Chiara; Wolthusen, Stephen.
Delay and Jitter Attacks on Hierarchical State Estimation. I: 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE 2016 ISBN 978-1-4673-8289-2. s. 485-490
NTNU Untitled
 
41 Gkioulos, Vasileios; Wolthusen, Stephen.
Efficient security policy reconciliation in tactical service oriented architectures. Communications in Computer and Information Science (CCIS) 2016 ;Volum 670. s. 47-61
NTNU Untitled
 
42 Gkioulos, Vasileios; Wolthusen, Stephen D..
Securing tactical service oriented architectures. I: 2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC). IEEE (Institute of Electrical and Electronics Engineers) 2016 ISBN 978-1-5090-2470-4. s. -
NTNU Untitled
 
43 Gkioulos, Vasileios; Wolthusen, Stephen; Flizikowski, Adam; Stachowicz, Anna; Nogalski, Dariusz; Gleba, Kamil; Sliwa, Joanna.
Interoperability of security and quality of Service Policies Over Tactical SOA. I: Proc. of 2016 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE conference proceedings 2016 ISBN 978-1-5090-4240-1.
NTNU Untitled
 
44 Gkioulos, Vasileios; Wolthusen, Stephen; Iossifides, Athanasios.
A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE). Norsk Informasjonssikkerhetskonferanse (NISK) 2016 ;Volum 2016. s. 31-42
NTNU Untitled
 
45 Kayem, Anne; Strauss, Heinrich; Wolthusen, Stephen D.; Meinel, Christoph.
Key Management for Secure Demand Data Communication in Constrained Micro-grids. I: 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE 2016 ISBN 978-1-5090-2461-2. s. 585-590
NTNU Untitled
 
46 Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen.
A distributed continuous double auction framework for resource constrained microgrids. Lecture Notes in Computer Science (LNCS) 2016 ;Volum 9578. s. 183-196
NTNU Untitled
 
47 Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen.
Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. I: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy. SciTePress 2016 ISBN 978-989-758-167-0. s. 448-456
NTNU Untitled
 
48 McEvoy, Thomas Richard; Wolthusen, Stephen.
An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms. I: Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers. Springer 2016 ISBN 978-3-319-31664-2. s. 109-121
NTNU Untitled
 
2015
49 Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen.
Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs. I: Information Security; 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings. Springer 2015 ISBN 978-3-319-27659-5. s. 140-151
NTNU Untitled
 
50 Alwasel, Bader; Wolthusen, Stephen.
Structural Controllability Analysis via Embedding Power Dominating Set Approximation in Erd˝os-R´enyi Graphs. I: WAINA2015, IEEE 29th International Conference on Advanced Information Networking and Applications Workshops; 25-27 March 2015, Gwangju, Korea. IEEE conference proceedings 2015 ISBN 978-1-4799-1774-7. s. 418-423
NTNU Untitled
 
    Vis neste liste