Towards an information-theoretic framework of intrusion detection for composed systems and robustness analyses | 0 | 0.34 | 2022 |
Spectra: detecting attacks on in-vehicle networks through spectral analysis of CAN-message payloads | 0 | 0.34 | 2021 |
A Framework for Determining Robust Context-Aware Attack-Detection Thresholds for Cyber-Physical Systems | 0 | 0.34 | 2021 |
TinyEVM: Off-Chain Smart Contracts on Low-Power IoT Devices | 0 | 0.34 | 2020 |
On the performance of commodity hardware for low latency and low jitter packet processing | 0 | 0.34 | 2020 |
Multiple pattern matching for network security applications: Acceleration through vectorization | 2 | 0.37 | 2020 |
Delegation sketch: a parallel design with support for fast and accurate concurrent operations | 0 | 0.34 | 2020 |
A scalable specification-agnostic multi-sensor anomaly detection system for IIoT environments | 1 | 0.35 | 2020 |
Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs | 0 | 0.34 | 2019 |
IoTLogBlock: Recording Off-line Transactions of Low-Power IoT Devices Using a Blockchain | 0 | 0.34 | 2019 |
Model-Free Detection of Cyberattacks on Voltage Control in Distribution Grids | 0 | 0.34 | 2019 |
Performance of Secure Boot in Embedded Systems | 0 | 0.34 | 2019 |
Continuous Monitoring meets Synchronous Transmissions and In-Network Aggregation | 0 | 0.34 | 2019 |
A Probe into Process-Level Attack Detection in Industrial Environments from a Side-Channel Perspective | 0 | 0.34 | 2019 |
Geometric Monitoring in Action - a Systems Perspective for the Internet of Things. | 0 | 0.34 | 2018 |
CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs. | 1 | 0.36 | 2018 |
Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems. | 7 | 0.44 | 2018 |
Data Modelling for Predicting Exploits. | 0 | 0.34 | 2018 |
Understanding Common Automotive Security Issues and Their Implications. | 0 | 0.34 | 2018 |
The influence of dataset characteristics on privacy preserving methods in the advanced metering infrastructure. | 1 | 0.37 | 2018 |
Detecting Non-Technical Energy Losses Through Structural Periodic Patterns In Ami Data | 0 | 0.34 | 2016 |
BES: Differentially Private and Distributed Event Aggregation in Advanced Metering Infrastructures. | 3 | 0.38 | 2016 |
Harnessing the unknown in advanced metering infrastructure traffic | 0 | 0.34 | 2015 |
A study on data de-pseudonymization in the smart grid | 4 | 0.42 | 2015 |
METIS: a two-tier intrusion detection system for advanced metering infrastructures | 5 | 0.45 | 2014 |
T-Fuzz: Model-Based Fuzzing for Robustness Testing of Telecommunication Protocols | 5 | 0.48 | 2014 |
Online temporal-spatial analysis for detection of critical events in Cyber-Physical Systems | 4 | 0.47 | 2014 |
Managing your trees: Insights from a metropolitan-scale low-power wireless network | 0 | 0.34 | 2014 |
Cybersecurity in the Smart Grid. | 0 | 0.34 | 2013 |
Analysis of the impact of data granularity on privacy for the smart grid | 6 | 0.51 | 2013 |
On collection of large-scale multi-purpose datasets on internet backbone links | 5 | 0.48 | 2011 |
Discussion Panel in conjunction with the 7th European Conference on Computer Network Defense (EC2ND 2011): Security Issues in the Smart Grid | 0 | 0.34 | 2011 |
Emerging and future cyber threats to critical systems | 0 | 0.34 | 2010 |
Tracking malicious hosts on a 10gbps backbone link | 3 | 0.40 | 2010 |
A Multi-Sensor Model to Improve Automated Attack Detection | 10 | 0.76 | 2008 |
A fading-insensitive performance metric for a unified link quality model | 85 | 7.17 | 2006 |
Using Active Learning in Intrusion Detection | 21 | 0.92 | 2004 |
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings | 16 | 3.94 | 2004 |
Dependable Intrusion Tolerance: Technology Demo | 2 | 0.38 | 2003 |
An Architecture for an Adaptive Intrusion-Tolerant Server | 23 | 2.18 | 2002 |
Application-Integrated Data Collection for Security Monitoring | 27 | 2.88 | 2001 |
A Lightweight Tool for Detecting Web Server Attacks | 39 | 8.37 | 2000 |