• Publications
  • Influence
A Methodology to Evaluate Agent Oriented Software Engineering Techniques
TLDR
We explore the various applications of agent-based systems categorized into different application domains. Expand
  • 56
  • 5
  • PDF
Quantifying security threats and their potential impacts: a case study
TLDR
We present an infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. Expand
  • 55
  • 2
  • PDF
Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation
TLDR
We studied the various types and frequency of attacks that may be levied on smart grid cyber physical systems. Expand
  • 8
  • 2
  • PDF
Co-Simulation Platform for Characterizing Cyber Attacks in Cyber Physical Systems
TLDR
This paper presents a Simulink and OPNET based co-simulated platform to carry out cyber-intrusion in a cyber-network for modern power systems and smart grids. Expand
  • 11
  • 2
  • PDF
Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure
TLDR
We consider design principles and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Expand
  • 7
  • 2
Secure cryptographic key management system (CKMS) considerations for smart grid devices
TLDR
In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments over a long period of performance. Expand
  • 4
  • 2
Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC)
TLDR
We extend the classic formulation of Availability combined with Mean Failure Cost (MFC) to address quantifying availability to harmonize well with ICS security risk assessment. Expand
  • 17
  • 1
  • PDF
Risk Assessment Methodology Based on the NISTIR 7628 Guidelines
TLDR
We propose an approach that allows analysts to estimate the security of a system in terms of the loss that each stakeholder stands to lose as a result of security breakdowns. Expand
  • 17
  • 1
  • PDF
Evaluating security controls based on key performance indicators and stakeholder mission
TLDR
This manuscript has been authored by a contractor of the U.S. Government under contract DE-AC05-00OR22725. Expand
  • 20
  • 1
Defining and computing a value based cyber-security measure
TLDR
In past work[1,3,4], we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities. Expand
  • 18
  • 1
...
1
2
3
4
5
...