• Publications
  • Influence
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
TLDR
We propose a new approach to automated response called the response and recovery engine (RRE). Expand
  • 165
  • 12
  • PDF
An Internet-wide view of ICS devices
TLDR
In this paper, we first analyzed devices exposed on the public Internet by implementing five popular protocols in ZMap and completing regular scans of the IPv4 address space. Expand
  • 53
  • 7
  • PDF
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
TLDR
We discuss key design principles and engineering practices that we believe can help ensure the correctness and effectiveness of standards for authentication in Power Grid protocols; e.g., DNP3. Expand
  • 80
  • 5
  • PDF
A framework for assessing threats and benefits to species responding to climate change
1.?Current national and international frameworks for assessing threats to species have not been developed in the context of climate change, and are not framed in a way that recognises newExpand
  • 114
  • 5
Exploring a tiered architecture for NASPInet
One of the missions of the North American SynchroPhasor Initiative (NASPI) is to create a robust, widely available and secure synchronized data measurement infrastructure, called the NASPI network orExpand
  • 41
  • 5
  • PDF
The Virtual Power System Testbed and Inter-Testbed Integration
TLDR
The Virtual Power System Testbed at University of Illinois at Urbana-Champaign is designed to be integrated with other testbeds across the country to explore performance and security of Supervisory Control And Data Acquisition (SCADA) protocols and equipment. Expand
  • 72
  • 4
  • PDF
SCADA: Issues, Vulnerabilities, and FutureDirections
TLDR
Pipeline explosions: nuclear reactor shut down; sewage spilling out into the streets: trains derailed. Expand
  • 15
  • 3
  • PDF
Enhancing Grid Measurements: Wide Area Measurement Systems, NASPInet, and Security
Deregulation, market transactions, congestion management, and the separation of functions have created increasing complexity that is making it difficult to maintain situational awareness andExpand
  • 38
  • 2
Seclius: An Information Flow-Based, Consequence-Centric Security Metric
TLDR
We present Seclius, an online security evaluation framework that translates low-level IDS alerts into a high-level system security measure and provides a ranking of past malicious events and affected system assets based on how crucial they are for the organization. Expand
  • 21
  • 2
  • PDF
Enhancing Grid Measurements
Digital Object Identifi er 10.1109/MPE.2011.943133 Date of publication: 13 December 2011 D DEREGULATION, MARKET TRANSACTIONS, CONGESTION MANAGEment, and the separation of functions have createdExpand
  • 11
  • 2
  • PDF
...
1
2
3
4
...