• Publications
  • Influence
Communication security for smart grid distribution networks
TLDR
The operation and control of the next generation electrical grids will depend on a complex network of computers, software, and communication technologies. Expand
  • 154
  • 10
  • PDF
Cyber Scanning: A Comprehensive Survey
TLDR
Cyber scanning refers to the task of probing enterprise networks or Internet wide services, searching for vulnerabilities or ways to infiltrate IT assets. Expand
  • 103
  • 5
  • PDF
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations
TLDR
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted significant attention from the research community. Expand
  • 109
  • 4
  • PDF
Survey of Attack Projection, Prediction, and Forecasting in Cyber Security
TLDR
This paper provides a survey of prediction, and forecasting methods used in cyber security. Expand
  • 58
  • 3
  • PDF
A Comprehensive Tutorial on Science DMZ
TLDR
Science and engineering applications are now generating data at an unprecedented rate. Expand
  • 16
  • 3
  • PDF
A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic
TLDR
This paper aims at inferring probing campaigns by investigating dark net traffic. Expand
  • 11
  • 2
  • PDF
Towards a Forecasting Model for Distributed Denial of Service Activities
TLDR
We propose a DDoS forecasting model to provide significant insights to organizations, security operators and emergency response teams during and after a targeted DDoS attack. Expand
  • 26
  • 1
  • PDF
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis
TLDR
This paper uniquely exploits passive monitoring and analysis of a newly deployed network telescope IP address space in a first attempt ever to build broad notions of real CPS maliciousness. Expand
  • 43
  • 1
  • PDF
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation
TLDR
An effective approach to gather cyber threat intelligence is to collect and analyze traffic destined to unused Internet addresses known as darknets. Expand
  • 29
  • 1
  • PDF
On fingerprinting probing activities
TLDR
This paper presents a new approach to fingerprint probing activity. Expand
  • 27
  • 1
  • PDF