Enter search criteria and click Apply. Be sure to click Reset and re-enter criteria for subsequent searches.

If you are a CREDC funded student/researcher and need to report your publication, please use this form.

Total records for this search: 113

Curing the Vulnerable Parser: Design Patterns for Secure Input Handling

Bratus, S., Hermerschmidt, L., Hallberg, S.M., Locasto, M., Momot, F.D., Patterson, M.L., and Shubina, A
Year: 2017 | Type: Magazine/News Article

Cyber Resilience Metrics for Bulk Power Systems

Shetty, S., Krishnappa, B., Nicol, D.M.
Year: 2017 | Type: Other

An Interactive, Extensible Environment for Power System Simulation on the PMU Time Frame with a Cyber Security Application

Overbye, T.J., Mao, Z., Shetye, K., and Weber, J.D.
Year: 2017 | Type: Proceedings

Attack Induced Common-Mode Failures on PLC-based Safety System in a Nuclear Power Plant

Lim, B., Chen, D., An, Y., Kalbarczyk, Z., Iyer, R.
Year: 2017 | Type:

Learning Process Behavioral Baselines for Anomaly Detection

Fawaz, A.M., Sanders, W.H.
Year: 2017 | Type: Proceedings

Automated Anomaly Detection in Distribution Grids Using Micro-PMU Measurements

Jamei, M., Scaglione, A., Roberts, C., Stewart, E., Peisert, S., McParland, C., McEachern, A.
Year: 2017 | Type: Proceedings

Optimal Electricity Pricing for Societal Infrastructure Systems

Alizadeh, M.; Wai, H.-T.; Goldsmith, A.; Scaglione, A.
Year: 2017 | Type: Proceedings

Multi-Receiver GPS-Based Direct Time Estimation for PMUs

Bhamidipati, S., Ng., Y., Gao, G.X
Year: 2017 | Type: Magazine/News Article

I am Joe's Fridge: Scalable Identity in the Internet of Things

Anatharaman, P., Palani, K., Nicol, D., Smith, S.W.
Year: 2016 | Type: Proceedings

An Internet-Wide View of ICS Devices

Mirian, A., Ma, Z., Adrian, D., Tischer, M., Chuenchujit, T., Yardley, T., Berthier, B., Mason, J., Durumeric, Z., Halderman, J.A., Bailey, M.
Year: 2016 | Type: Proceedings

Load Oscillating Smart Meter Attack

Lassetter, C., Cotilla-Sanchez, E., Kim, J.
Year: 2016 | Type: Proceedings

Implementing a vertically hardened DNP3 control stack for power applications

Bratus, S., Crain, A.J., Hallberg, S., Hirsch, D.P., Patterson, M.L., Koo, M., Smith, S.W.
Year: 2016 | Type: Proceedings

Multi-agent System for Detecting False Data Injection Attacks Against the Power Grid

Amullen, E., Lin, H., Kalbarczyk, Z., Keel, L.
Year: 2016 | Type: Proceedings

Exploring Security Metrics for Electric Grid Infrastructures Leveraging Attack Graphs

Patapanchala, P.S., Huo, C., Bobba, R., Cotilla-Sanchez, E.
Year: 2016 | Type: Proceedings

Cyber-Air-Gapped Detection of Controller Attacks through Physical Interdependencies (2016)

Etigowni, S., Cintuglu, M., Kazerooni, M., Hossain, S., Sun, P., Davis, K., Mohammed, O., Zonouz, S.
Year: 2016 | Type: Proceedings

The Seven Turrets of Babel: A Taxonomy of LangSec Errors and How to Expunge Them

Momot, F., Bratus, S., Hallberg, S., Patterson, M.
Year: 2016 | Type: Proceedings

Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security

Jamei, M., Stewart, E., Peisert, S., Scaglione, A., McParland, C., Roberts, C., McEachern, A.
Year: 2016 | Type: Journal Article

Data Injection Attacks in Randomized Gossiping

Gentz, R., Xiaoxiao, S., Wai, H-T., Scaglione, A., Leshem, A.
Year: 2016 | Type: Journal Article