Current Research Information SysTem In Norway
 
 

 English version


 
Hovedside
Forskningsresultater/NVI
Forskere
Prosjekter
Forskningsenheter
Logg inn
Om Cristin
 
 
   
Eksporter til


Viser treff 1-50 av 107 << Forrige 1 2 3    Neste >>

2020
1 Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen.
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols. IEEE Conference Publication 2020
NTNU Untitled
 
2 Nweke, Livinus Obiora; Wolthusen, Stephen.
A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda. Advances in Intelligent Systems and Computing 2020
NTNU Untitled
 
3 Nweke, Livinus Obiora; Wolthusen, Stephen.
A Review of Asset-Centric Threat Modelling Approaches. International Journal of Advanced Computer Science and Applications (IJACSA) 2020 ;Volum 11.(2) s. 1-6
NTNU Untitled
 
4 Nweke, Livinus Obiora; Wolthusen, Stephen.
Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection. Wirtschaftsinformatik 2020
NTNU Untitled
 
5 Nweke, Livinus Obiora; Wolthusen, Stephen.
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection. International Conference on Cyber Conflict, CYCON 2020
NTNU Untitled
 
6 Nweke, Livinus Obiora; Wolthusen, Stephen.
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model. IEEE Conference Publication 2020
NTNU Untitled
 
7 Nweke, Livinus Obiora; Wolthusen, Stephen.
Resilience Analysis of Software-Defined Networks Using Queueing Networks. International Conference on Computing, Networking, and Communications 2020
NTNU Untitled
 
8 Nweke, Livinus Obiora; Yeng, Prosper; Wolthusen, Stephen; Yang, Bian.
Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices. International Journal of Advanced Computer Science and Applications (IJACSA) 2020 ;Volum 11.(2) s. 683-690
NTNU Untitled
 
2019
9 Gul, Ammara; Wolthusen, Stephen.
In-cycle sequential topology faults and attacks: Effects on state estimation. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11260 LNCS. s. 17-28
NTNU Untitled
 
10 Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen.
Threat Analysis for Smart Homes. Future Internet 2019 ;Volum 11.(10) s. -
NTNU Untitled
 
11 Nweke, Livinus Obiora; Wolthusen, Stephen; Mancini, Luigi V..
A Framework for the Validation of Network Artifacts. Norsk Informasjonssikkerhetskonferanse (NISK) 2019 ;Volum 12. s. -
NTNU Untitled
 
2018
12 Baiocco, Alessio; Wolthusen, Stephen.
Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol. IEEE Power & Energy Society General Meeting 2018 s. -
NTNU Untitled
 
13 Darwish, Salaheddin; Nouretdinov, Ilia; Wolthusen, Stephen.
A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 10898 LNCS. s. 146-157
NTNU Untitled
 
14 Gul, Ammara; Wolthusen, Stephen.
Error propagation after reordering attacks on hierarchical state estimation. IFIP Advances in Information and Communication Technology 2018 ;Volum 542. s. 67-79
NTNU Untitled
 
15 Wright, James G; Wolthusen, Stephen.
De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 10707 LNCS. s. 131-143
NTNU Untitled
 
2017
16 Alcaraz, Cristina; Lopez, Javier; Wolthusen, Stephen.
OCPP Protocol: Security Threats and Challenges. IEEE Transactions on Smart Grid 2017 ;Volum 8.(5) s. 2452-2459
NTNU Untitled
 
17 Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph.
Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids. I: Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers. Springer 2017 ISBN 978-3-319-61436-6. s. 52-68
NTNU Untitled
 
18 Gkioulos, Vasileios; Risthein, Erko; Wolthusen, Stephen.
TACTICS: Validation of the security framework developed for tactical SOA. Journal of Information Security and Applications 2017 ;Volum 35. s. 96-105
NTNU Untitled
 
19 Gkioulos, Vasileios; Wolthusen, Stephen.
A Security Policy Infrastructure for Tactical Service Oriented Architectures. I: Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers. Springer 2017 ISBN 978-3-319-61436-6. s. 37-51
NTNU Untitled
 
20 Gkioulos, Vasileios; Wolthusen, Stephen.
Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures. Advances in Intelligent Systems and Computing 2017 ;Volum 461. s. 149-166
NTNU Untitled
 
21 Gkioulos, Vasileios; Wolthusen, Stephen.
Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017. Advances in Intelligent Systems and Computing 2017 ;Volum 611. s. 310-322
NTNU Untitled
 
22 Gkioulos, Vasileios; Wolthusen, Stephen.
Security Requirements for the Deployment of Services Across Tactical SOA. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10446 LNCS. s. 115-127
NTNU Untitled
 
23 Kayem, Anne V.D.M.; Meinel, Christoph; Wolthusen, Stephen.
A smart micro-grid architecture for resource constrained environments. Advanced Information Networking and Applications 2017 s. 857-864
NTNU Untitled
 
24 Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen.
Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids. I: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE 2017 ISBN 978-1-5090-4297-5. s. 1380-1387
NTNU Untitled
 
25 Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen.
Power auctioning in resource constrained micro-grids: Cases of cheating. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10242 LNCS. s. 137-149
NTNU Untitled
 
26 Rigolin Ferreira Lopes, Roberto; Nieminen, Mikko; Viidanoja, Antti; Wolthusen, Stephen.
Reactive/Proactive Connectivity Management in a Tactical Service-Oriented Infrastructure. I: 2017 International Conference on Military Communications and Information Systems (ICMCIS); May 15-16, 2017; Oulu, Finland. IEEE Communications Society 2017 ISBN 978-1-5386-3858-3.
NTNU Untitled
 
27 Weldehawaryat, Goitom Kahsay; Ambassa, Pacome L.; Marufu, Anesu M.C.; Wolthusen, Stephen; Kayem, Anne V.D.M..
Decentralised scheduling of power consumption in micro-grids: Optimisation and security. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10166 LNCS. s. 69-86
NTNU Untitled
 
28 Wright, James G; Wolthusen, Stephen.
Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10242 LNCS. s. 239-251
NTNU Untitled
 
2016
29 Alcaraz, Cristina; Lopeza, Javier; Wolthusen, Stephen.
Policy enforcement system for secure interoperable control in distributed Smart Grid systems. Journal of Network and Computer Applications 2016 ;Volum 59. s. 301-314
NTNU Untitled
 
30 Almulla, Sameera; Iraqi, Youssef; Wolthusen, Stephen.
Inferring relevance and presence of evidence in service-oriented and SaaS architectures. Proceedings of the IEEE Symposium on Computers and Communications 2016 ;Volum 2016-February. s. 152-159
NTNU Untitled
 
31 Al-Mutairi, Abdulrahman; Wolthusen, Stephen.
MPLS Policy Target Recognition Network. Lecture Notes in Computer Science (LNCS) 2016 ;Volum 9572. s. 71-87
NTNU Untitled
 
32 Alwasel, Bader; Wolthusen, Stephen.
Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes. Lecture Notes in Computer Science (LNCS) 2016 ;Volum 9578. s. 105-119
NTNU Untitled
 
33 Alwasel, Bader; Wolthusen, Stephen.
Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use. I: Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers. Springer 2016 ISBN 978-3-319-31664-2. s. 293-307
NTNU Untitled
 
34 Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Cristoph.
Privacy Violations in Constrained Micro-grids: Adversarial Cases. I: Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016. IEEE 2016 ISBN 978-1-5090-1857-4. s. 601-606
NTNU Untitled
 
35 Baiocco, Alessio; Foglietta, Chiara; Wolthusen, Stephen.
Delay and Jitter Attacks on Hierarchical State Estimation. I: 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE 2016 ISBN 978-1-4673-8289-2. s. 485-490
NTNU Untitled
 
36 Gkioulos, Vasileios; Wolthusen, Stephen.
Efficient security policy reconciliation in tactical service oriented architectures. Communications in Computer and Information Science 2016 ;Volum 670. s. 47-61
NTNU Untitled
 
37 Gkioulos, Vasileios; Wolthusen, Stephen D..
Securing Tactical Service Oriented Architectures. I: 2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC). IEEE 2016 ISBN 978-1-5090-2470-4. s. -
NTNU Untitled
 
38 Gkioulos, Vasileios; Wolthusen, Stephen; Flizikowski, Adam; Stachowicz, Anna; Nogalski, Dariusz; Gleba, Kamil; Sliwa, Joanna.
Interoperability of security and quality of Service Policies Over Tactical SOA. I: Proc. of 2016 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE conference proceedings 2016 ISBN 978-1-5090-4240-1.
NTNU Untitled
 
39 Gkioulos, Vasileios; Wolthusen, Stephen; Iossifides, Athanasios.
A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE). Norsk Informasjonssikkerhetskonferanse (NISK) 2016 ;Volum 2016. s. 31-42
NTNU Untitled
 
40 Kayem, Anne; Strauss, Heinrich; Wolthusen, Stephen D.; Meinel, Christoph.
Key Management for Secure Demand Data Communication in Constrained Micro-grids. I: 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE 2016 ISBN 978-1-5090-2461-2. s. 585-590
NTNU Untitled
 
41 Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen.
A distributed continuous double auction framework for resource constrained microgrids. Lecture Notes in Computer Science (LNCS) 2016 ;Volum 9578. s. 183-196
NTNU Untitled
 
42 Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen.
Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. I: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy. SciTePress 2016 ISBN 978-989-758-167-0. s. 448-456
NTNU Untitled
 
43 McEvoy, Thomas Richard; Wolthusen, Stephen.
An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms. I: Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers. Springer 2016 ISBN 978-3-319-31664-2. s. 109-121
NTNU Untitled
 
2015
44 Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen.
Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs. I: Information Security; 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings. Springer 2015 ISBN 978-3-319-27659-5. s. 140-151
NTNU Untitled
 
45 Alwasel, Bader; Wolthusen, Stephen.
Structural Controllability Analysis via Embedding Power Dominating Set Approximation in Erd˝os-R´enyi Graphs. I: WAINA2015, IEEE 29th International Conference on Advanced Information Networking and Applications Workshops; 25-27 March 2015, Gwangju, Korea. IEEE conference proceedings 2015 ISBN 978-1-4799-1774-7. s. 418-423
NTNU Untitled
 
46 Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Christoph.
Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids. I: Future Network Systems and Security: First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings. Springer 2015 ISBN 978-3-319-19210-9. s. 166-180
NTNU Untitled
 
47 Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph.
Robust Snapshot Algorithm for Power Consumption Monitoring in Computationally Constrained Micro-Grids. I: 2015 IEEE Innovative Smart Grid Technologies - Asia Conference Proceedings. IEEE conference proceedings 2015 ISBN 9781509012381.
NTNU Untitled
 
48 Gkioulos, Vasileios; Wolthusen, Stephen.
Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks. Norsk Informasjonssikkerhetskonferanse (NISK) 2015 s. -
NTNU Untitled
 
49 Lopes, Roberto Rigolin Ferreira; Wolthusen, Stephen.
Distributed Security Policies for Service-Oriented Architectures over Tactical Networks. I: Military Communications Conference, MILCOM 2015; October 26-28, 2015 Tampa, USA. IEEE conference proceedings 2015 ISBN 978-1-5090-0073-9. s. 1548-1553
NTNU Untitled
 
50 Weldehawaryat, Goitom; Wolthusen, Stephen.
Modelling Interdependencies over Incomplete Join Structures of Power Law Networks. I: 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN). IEEE conference proceedings 2015 ISBN 978-1-4799-7795-6. s. 173-178
NTNU Untitled
 
    Vis neste liste