2022
|
1. |
Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466)). International Journal of Critical Infrastructure Protection 2022 ;Volum 36. s. - NTNU
Untitled
|
2021
|
2. |
Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus. International Journal of Critical Infrastructure Protection 2021 ;Volum 35. NTNU
Untitled
|
|
3. |
Nweke, Livinus Obiora; Wolthusen, Stephen. A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda. Lecture Notes in Networks and Systems 2021 ;Volum 254. s. 220-228 NTNU
Untitled
|
|
4. |
Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring. International Journal of Advanced Computer Science and Applications (IJACSA) 2021 ;Volum 12.(3) s. 23-30 NTNU
Untitled
|
2020
|
5. |
Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen. Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols. I: 16th International Conference on the Design of Reliable Communication Networks DRCN 2020. IEEE conference proceedings 2020 ISBN 978-1-7281-6300-0. s. 1-8 NTNU
Untitled
|
|
6. |
Nweke, Livinus Obiora; Wolthusen, Stephen. A Review of Asset-Centric Threat Modelling Approaches. International Journal of Advanced Computer Science and Applications (IJACSA) 2020 ;Volum 11.(2) s. 1-6 NTNU
Untitled
|
|
7. |
Nweke, Livinus Obiora; Wolthusen, Stephen. Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection. Wirtschaftsinformatik 2020 NTNU
Untitled
|
|
8. |
Nweke, Livinus Obiora; Wolthusen, Stephen. Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection. International Conference on Cyber Conflict, CYCON 2020 NTNU
Untitled
|
|
9. |
Nweke, Livinus Obiora; Wolthusen, Stephen. Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model. I: 2020 IEEE Conference on Communications and Network Security (CNS). IEEE conference proceedings 2020 ISBN 978-1-7281-4760-4. s. 1-6 NTNU
Untitled
|
|
10. |
Nweke, Livinus Obiora; Wolthusen, Stephen. Resilience Analysis of Software-Defined Networks Using Queueing Networks. I: 2020 International Conference on Computing, Networking and Communications (ICNC). IEEE conference proceedings 2020 ISBN 978-1-7281-4905-9. s. 536-542 NTNU
Untitled
|
|
11. |
Nweke, Livinus Obiora; Yeng, Prosper; Wolthusen, Stephen; Yang, Bian. Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices. International Journal of Advanced Computer Science and Applications (IJACSA) 2020 ;Volum 11.(2) s. 683-690 NTNU
Untitled
|
|
12. |
Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice. International Journal of Advanced Computer Science and Applications (IJACSA) 2020 ;Volum 11.(11) s. 772-784 NTNU
Untitled
|
|
13. |
Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. Legal requirements toward enhancing the security of medical devices. International Journal of Advanced Computer Science and Applications (IJACSA) 2020 ;Volum 11.(11) s. 666-675 NTNU
Untitled
|
2019
|
14. |
Gul, Ammara; Wolthusen, Stephen. In-cycle sequential topology faults and attacks: Effects on state estimation. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11260 LNCS. s. 17-28 NTNU
Untitled
|
|
15. |
Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen. Threat Analysis for Smart Homes. Future Internet 2019 ;Volum 11.(10) s. - NTNU
Untitled
|
|
16. |
Nweke, Livinus Obiora; Wolthusen, Stephen; Mancini, Luigi V.. A Framework for the Validation of Network Artifacts. Norsk Informasjonssikkerhetskonferanse (NISK) 2019 ;Volum 12. s. - NTNU
Untitled
|
2018
|
17. |
Wright, James G; Wolthusen, Stephen. De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 10707 LNCS. s. 131-143 NTNU
Untitled
|
|
18. |
Baiocco, Alessio; Wolthusen, Stephen. Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol. IEEE Power & Energy Society General Meeting 2018 s. - NTNU
Untitled
|
|
19. |
Darwish, Salaheddin; Nouretdinov, Ilia; Wolthusen, Stephen. A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 10898 LNCS. s. 146-157 NTNU
Untitled
|
|
20. |
Gul, Ammara; Wolthusen, Stephen. Error propagation after reordering attacks on hierarchical state estimation. IFIP Advances in Information and Communication Technology 2018 ;Volum 542. s. 67-79 NTNU
Untitled
|
2017
|
21. |
Alcaraz, Cristina; Lopez, Javier; Wolthusen, Stephen. OCPP Protocol: Security Threats and Challenges. IEEE Transactions on Smart Grid 2017 ;Volum 8.(5) s. 2452-2459 NTNU
Untitled
|
|
22. |
Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph. Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids. I: Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers. Springer 2017 ISBN 978-3-319-61436-6. s. 52-68 NTNU
Untitled
|
|
23. |
Gkioulos, Vasileios; Risthein, Erko; Wolthusen, Stephen. TACTICS: Validation of the security framework developed for tactical SOA. Journal of Information Security and Applications 2017 ;Volum 35. s. 96-105 NTNU
Untitled
|
|
24. |
Gkioulos, Vasileios; Wolthusen, Stephen. A Security Policy Infrastructure for Tactical Service Oriented Architectures. I: Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers. Springer 2017 ISBN 978-3-319-61436-6. s. 37-51 NTNU
Untitled
|
|
25. |
Gkioulos, Vasileios; Wolthusen, Stephen. Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures. Advances in Intelligent Systems and Computing 2017 ;Volum 461. s. 149-166 NTNU
Untitled
|
|
26. |
Gkioulos, Vasileios; Wolthusen, Stephen. Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017. Advances in Intelligent Systems and Computing 2017 ;Volum 611. s. 310-322 NTNU
Untitled
|
|
27. |
Gkioulos, Vasileios; Wolthusen, Stephen. Security Requirements for the Deployment of Services Across Tactical SOA. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10446 LNCS. s. 115-127 NTNU
Untitled
|
|
28. |
Kayem, Anne V.D.M.; Meinel, Christoph; Wolthusen, Stephen. A smart micro-grid architecture for resource constrained environments. Advanced Information Networking and Applications 2017 s. 857-864 NTNU
Untitled
|
|
29. |
Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids. I: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE (Institute of Electrical and Electronics Engineers) 2017 ISBN 978-1-5090-4297-5. s. 1380-1387 NTNU
Untitled
|
|
30. |
Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. Power auctioning in resource constrained micro-grids: Cases of cheating. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10242 LNCS. s. 137-149 NTNU
Untitled
|
|
31. |
Rigolin Ferreira Lopes, Roberto; Nieminen, Mikko; Viidanoja, Antti; Wolthusen, Stephen. Reactive/Proactive Connectivity Management in a Tactical Service-Oriented Infrastructure. I: 2017 International Conference on Military Communications and Information Systems (ICMCIS); May 15-16, 2017; Oulu, Finland. IEEE Communications Society 2017 ISBN 978-1-5386-3858-3. NTNU
Untitled
|
|
32. |
Weldehawaryat, Goitom Kahsay; Ambassa, Pacome L.; Marufu, Anesu M.C.; Wolthusen, Stephen; Kayem, Anne V.D.M.. Decentralised scheduling of power consumption in micro-grids: Optimisation and security. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10166 LNCS. s. 69-86 NTNU
Untitled
|
|
33. |
Wright, James G; Wolthusen, Stephen. Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10242 LNCS. s. 239-251 NTNU
Untitled
|
2016
|
34. |
Alcaraz, Cristina; Lopeza, Javier; Wolthusen, Stephen. Policy enforcement system for secure interoperable control in distributed Smart Grid systems. Journal of Network and Computer Applications 2016 ;Volum 59. s. 301-314 NTNU
Untitled
|
|
35. |
Almulla, Sameera; Iraqi, Youssef; Wolthusen, Stephen. Inferring relevance and presence of evidence in service-oriented and SaaS architectures. Proceedings of the IEEE Symposium on Computers and Communications 2016 ;Volum 2016-February. s. 152-159 NTNU
Untitled
|
|
36. |
Al-Mutairi, Abdulrahman; Wolthusen, Stephen. MPLS Policy Target Recognition Network. Lecture Notes in Computer Science (LNCS) 2016 ;Volum 9572. s. 71-87 NTNU
Untitled
|
|
37. |
Alwasel, Bader; Wolthusen, Stephen. Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes. Lecture Notes in Computer Science (LNCS) 2016 ;Volum 9578. s. 105-119 NTNU
Untitled
|
|
38. |
Alwasel, Bader; Wolthusen, Stephen. Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use. I: Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers. Springer 2016 ISBN 978-3-319-31664-2. s. 293-307 NTNU
Untitled
|
|
39. |
Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Cristoph. Privacy Violations in Constrained Micro-grids: Adversarial Cases. I: Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016. IEEE 2016 ISBN 978-1-5090-1857-4. s. 601-606 NTNU
Untitled
|
|
40. |
Baiocco, Alessio; Foglietta, Chiara; Wolthusen, Stephen. Delay and Jitter Attacks on Hierarchical State Estimation. I: 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE 2016 ISBN 978-1-4673-8289-2. s. 485-490 NTNU
Untitled
|
|
41. |
Gkioulos, Vasileios; Wolthusen, Stephen. Efficient security policy reconciliation in tactical service oriented architectures. Communications in Computer and Information Science (CCIS) 2016 ;Volum 670. s. 47-61 NTNU
Untitled
|
|
42. |
Gkioulos, Vasileios; Wolthusen, Stephen D.. Securing tactical service oriented architectures. I: 2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC). IEEE (Institute of Electrical and Electronics Engineers) 2016 ISBN 978-1-5090-2470-4. s. - NTNU
Untitled
|
|
43. |
Gkioulos, Vasileios; Wolthusen, Stephen; Flizikowski, Adam; Stachowicz, Anna; Nogalski, Dariusz; Gleba, Kamil; Sliwa, Joanna. Interoperability of security and quality of Service Policies Over Tactical SOA. I: Proc. of 2016 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE conference proceedings 2016 ISBN 978-1-5090-4240-1. NTNU
Untitled
|
|
44. |
Gkioulos, Vasileios; Wolthusen, Stephen; Iossifides, Athanasios. A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE). Norsk Informasjonssikkerhetskonferanse (NISK) 2016 ;Volum 2016. s. 31-42 NTNU
Untitled
|
|
45. |
Kayem, Anne; Strauss, Heinrich; Wolthusen, Stephen D.; Meinel, Christoph. Key Management for Secure Demand Data Communication in Constrained Micro-grids. I: 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE 2016 ISBN 978-1-5090-2461-2. s. 585-590 NTNU
Untitled
|
|
46. |
Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. A distributed continuous double auction framework for resource constrained microgrids. Lecture Notes in Computer Science (LNCS) 2016 ;Volum 9578. s. 183-196 NTNU
Untitled
|
|
47. |
Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. I: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy. SciTePress 2016 ISBN 978-989-758-167-0. s. 448-456 NTNU
Untitled
|
|
48. |
McEvoy, Thomas Richard; Wolthusen, Stephen. An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms. I: Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers. Springer 2016 ISBN 978-3-319-31664-2. s. 109-121 NTNU
Untitled
|
2015
|
49. |
Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen. Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs. I: Information Security; 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings. Springer 2015 ISBN 978-3-319-27659-5. s. 140-151 NTNU
Untitled
|
|
50. |
Alwasel, Bader; Wolthusen, Stephen. Structural Controllability Analysis via Embedding Power Dominating Set Approximation in Erd˝os-R´enyi Graphs. I: WAINA2015, IEEE 29th International Conference on Advanced Information Networking and Applications Workshops; 25-27 March 2015, Gwangju, Korea. IEEE conference proceedings 2015 ISBN 978-1-4799-1774-7. s. 418-423 NTNU
Untitled
|