Publications

Please view the copyright notices at the bottom of this page prior to downloading any papers.


  1. On-Chip Control Flow Integrity Check for Real Time Embedded Systems

    Abad, F. A. T., Woude, J. V. d., Lu, Yi, Bak, S., Caccamo, M., Sha, L., Mancuso, R., Mohan, S.

    to appear in the 1st IEEE International Conference on Cyber-Physical Systems, Networks and Applications (CPNSA), 2013.

    Tags: 2013
  2. Adaptive GridStat Information Flow Mechanisms and Management for Power Grid Contingencies

    Abelsen, S.

    Master's Thesis, Washington State University, 2007.

    Tags: 2007, Master's Thesis
  3. Adaptive Information Flow Mechanisms and Management for Power Grid Contingencies

    Abelsen, S.; Viddal, E. S.; Gjermundrød, K. H.; Bakken, D. E.; Hauser, C. H.

    Washington State University School of EECS Technical Report, EECS-GS-012, 2007.

    Tags: 2007
  4. A Fault-tolerant Key Storage Service with Proactive Recovery

    Agrawal, P.

    Master’s Thesis, Washington State University, August 2012.

    Tags: 2012, Master's Thesis
  5. Toward an On-Demand Restricted Delegation Mechanism for Grids

    Ahsant, M.; Basney, J.; Mulmo, O.; Lee, A. J.; Johnsson, L.

    Proceedings of the 7th IEEE/ACM International Conference on Grid Computing (Grid 2006),  pp.152-159, 28-29 Sept. 2006.1 2 [IEEE Xplore entry]

    Tags: 2006
  6. Direct Load Management of Electric Vehicles

    Alizadeh, M.; Scaglione, A.; Thomas, R.J.

    2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.5964-5967, 22-27 May 2011.1 [IEEE Xplore entry]

    Tags: 2011
  7. Information Infrastructure for Cellular Load Management in Green Power Delivery Systems

    Alizadeh, M.; Scaglione, A.; Thomas, R.J.; Callaway, D.

    2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp.13-18, 17-20 Oct. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  8. On the Impact of SmartGrid Metering Infrastructure on Load Forecasting

    Alizadeh, M.; Scaglione, A.; Wang, Z.

    48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.1628-1636, Sept. 29 2010-Oct. 1 2010.1 [IEEE Xplore entry]

    Tags: 2010
  9. Demand Side Management Trends in the Power Grid

    Alizadeh, M.; Wang, Z.; Scaglione, A.

    In Proceedings of the 4th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), pp.141-144, 13-16 Dec. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  10. Demand-Side Management in the Smart Grid: Information Processing for the Power Switch

    Alizadeh, M.; Xiao Li; Zhifang Wang; Scaglione, A.; Melton, R.

    IEEE Signal Processing Magazine, vol. 29, no. 5, September, 2012 , pp. 55- 67.1 [IEEE Xplore entry]

    Tags: 2012
  11. Automatic Security Assessment of Control Systems for Critical Cyber-Infrastructures

    Anwar, Z.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2008.

    Tags: 2008, Ph.D. Dissertation
  12. Automated Assessment of Compliance with Security Best Practices

    Anwar, Z.; Campbell, R.H.

    Critical Infrastructure Protection II: Proceedings of the Second Annual IFIP WG 11.10 International Conference, Arlington, Virginia, March 17-19, 2008, pp. 173-187. [SpringerLink entry]

    Tags: 2008
  13. Budget Constrained Optimal Security Hardening of Control Networks for Critical Cyber-infrastructures

    Anwar, Z.; Montanari, M.; Gutierrez, A.; Campbell, R. H.

    International Journal of Critical Infrastructure Protection, vol. 2, nos. 1-2, May 2009, pp. 13-25.  [ScienceDirect entry]

    Tags: 2009
  14. Automatic Security Assessment of Critical Cyber-Infrastructures

    Anwar, Z.; Shankesi, R.; Campbell, R. H.

    Proceedings of the IEEE International Conference on Dependable Systems and Networks with FTCS and DCC (DSN 2008), Anchorage, Alaska, June 24-27, 2008, pp. 366-375.1 [IEEE Xplore entry]

    Tags: 2008
  15. Effects of Various Uncertainty Sources on Automatic Generation Control Systems

    Apostolopoulou, D., Chen, Y.C., Zhang, J., Dominguez-Garcia, A.D., Sauer, P.

    in Proceedings of the IREP Bulk Power System Dynamics and Control Symposium, Crete, Greece, August 2013.1

    Tags: 2013
  16. Distributed and Decentralized Control of the Power Grid

    Aquino-Lugo, A. A.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2010. [IDEALS entry]

    Tags: 2010, Ph.D. Dissertation
  17. A Control Framework for the Smart Grid for Voltage Support Using Agent Based Technologies

    Aquino-Lugo, A. A.; Klump, R.; Overbye, T. J.

    IEEE Transactions on Smart Grid, vol.2, no.1, pp.173-180, March 2011.1 [IEEE Xplore entry]

    Tags: 2011
  18. Distributed Intelligent Agents for Service Restoration and Control Applications

    Aquino-Lugo, A. A.; Overbye, T. J.

    Proceedings of the 40th North American Power Symposium, Calgary, Canada, September 28-30, 2008.1 [IEEE Xplore entry]

    Tags: 2008
  19. Pulse Coupled Discrete Oscillators Dynamics for Network Scheduling

    Ashkiani, S., Scaglione, A.

    IEEE 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.1551,1558, 1-5 Oct. 2012.1 [IEEE entry]

    Tags: 2013
  20. Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems

    Au, M. H.; Tsang, P.; Susilo, W.; Mu, Y.

    Proceedings of the Cryptographers' Track at the RSA Conference 2009 (CT-RSA 2009), April 20-24, 2009, Lecture Notes in Computer Science, vol. 5473, Berlin/Heidelberg: Springer, 2009, pp. 295-308. [SpringerLink entry]

    Tags: 2009
  21. Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs

    Au, M.; Kapadia, A.; Tsang, P.; Smith, S. W.

    Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS '07), Nov. 2007, pp. 72-81.2 [ACM Digital Library entry]

    Tags: 2007
  22. Attacking and Defending Networked Embedded Devices

    Baek, K.-H.; Bratus, S.; Sinclair, S.; Smith, S. W.

    Proceedings of the 2nd Workshop on Embedded Systems Security (WESS'2007), 2007.

    Tags: 2007
  23. Trusted Virtual Containers on Demand

    Bailey, K.; Smith, S. W.

     In Proceedings of the fifth ACM workshop on Scalable trusted computing (STC '10). ACM, New York, NY, USA, 63-72.2 [ACM Digital Library entry]

    Tags: 2010
  24. Power Applications Enabled by Mission Critical Cloud Computing

    Bakken, D., Venkatasubramanian, M., Hedman, K., Lui, Y., Bose, A., Grijalva, S., Robertson, R., Gamage, T.

    to appear as a book chapter in Smart Grids: Clouds, Communication, and Automation, Eds. David Bakken and Kris Iniewski, CRC Press, 2014.

    Tags: 2013
  25. EC Efforts in SCADA-Related Research: Selected Projects

    Bakken, D.; Bose, A.; Hauser, C.

    Technical Report EECS-GS-008, Washington State University, 20 October 2006.

    Tags: 2006
  26. Smart Generation and Transmission with Coherent, Real-Time Data

    Bakken, D.; Bose, A.; Hauser, C.; Schweitzer, E.; Whitehead, D.; Zweigle, G.

    Technical Report TR-GS-015, School of Electrical Engineering and Computer Science, Washington State University, August 2010.

    Tags: 2010
  27. Towards More Flexible and Robust Data Delivery for Monitoring and Control of the Electric Power Grid

    Bakken, D.; Hauser, C.; Gjermundrod, H.; Bose, A

    Technical Report EECS-GS-009, Washington State University, 7 May 2007.

    Tags: 2007
  28. Delivery Requirements and Implementation Guidelines for the NASPInet Data Bus

    Bakken, D.; Hauser, C.; Gjermundrød, H.

    Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, Maryland, Oct. 4-6, 2010, pp. 37-42.1 [IEEE Xplore entry]

    Tags: 2010
  29. Smart Generation and Transmission with Coherent, Real-Time Data

    Bakken, D.E.; Bose, A.; Hauser, C.H.; Whitehead, D. E.; Zweigle, G. C.

    Proceedings of the IEEE , vol.99, no.6, pp.928-951, June 2011.1 [IEEE Xplore entry]

    Tags: 2011
  30. ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection

    Bangert, J., Bratus, S., Shapiro, R., Locasto, M.E., Reeves, J., Smith, S.W., Shubina, A.

    published as Dartmouth Computer Science Technical Report TR2013-727, May 2013.[Dartmouth entry]

    Tags: 2013
  31. The Page-Fault Weird Machine: Lessons in Instruction-less Computation

    Bangert, J., Bratus, S., Shapiro, R., Smith, S.

    in proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013.

    Tags: 2013
  32. NetODESSA: Dynamic Policy Enforcement in Cloud Networks

    Bellessa, J.; Kroske, E.; Farivar, R.; Montanari, M.; Larson, K.; Campbell, R.H.

    2011 30th IEEE Symposium on Reliable Distributed Systems Workshops (SRDSW), pp.57-61, 4-7 Oct. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  33. Power Grid Simulation, Evaluation, and Test Framework

    Bergman, D. C.

    Master's Thesis, University of Illinois at Urbana-Champaign, 2010. [IDEALS entry]

    Tags: 2010, Master's Thesis
  34. Nonintrusive Load-Shed Verification

    Bergman, D. C.; Jin, D.; Juen, J. P.; Tanaka, N.; Gunter, C. A.; Wright, A. K.

    IEEE Pervasive Computing Special Issue on Smart Energy Systems, vol. 10, no. 1, Jan.-Mar. 2011, pp. 49-57.1 [IEEE Xplore entry]

    Tags: 2011
  35. The Virtual Power System Testbed and Inter-Testbed Integration

    Bergman, D. C.; Jin, D.; Nicol, D. M.; Yardley, T.

    Proceedings of CSET 2009: 2nd Workshop on Cyber Security Experimentation and Test, Montreal, Quebec, Canada, August 10, 2009. [USENIX entry]

    Tags: 2009
  36. Distributed Non-Intrusive Load Monitoring

    Bergman, D.C. ; Dong Jin ; Juen, J.P. ; Tanaka, N. ; Gunter, C.A. ; Wright, A.K.

    2011 IEEE PES Innovative Smart Grid Technologies (ISGT), pp.1-8, 17-19 Jan. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  37. Monitoring Advanced Metering Infrastructures with Amilyzer

    Berthier, R., and Sanders, W.H.

    in proceedings of the Cybersecurity of SCADA and Industrial Control Systems (C&ESAR), November 19, 20, 21, Rennes, France.

    Tags: 2013
  38. State Estimation and Contingency Analysis of the Power Grid in a Cyber-Adversarial Environment [Extended Abstract]

    Berthier, R., Bobba, R., Davis, M., Rogers, K.M., Zonouz, S.

    In proceedings of the NIST Workshop on Cybersecurity for Cyber-Physical Systems, April 23-24, 2012, Gaithersburg, MD. [NIST Workshop entry]

    Tags: 2012
  39. Reconciling Security Protection and Monitoring Requirements in Advanced Metering Infrastructures

    Berthier, R., Jetcheva, J. G., Mashima, D., Huh, J. Ho, Grochocki, D., Bobba, R., Cárdenas, A.A., and Sanders, W.H.

    to appear in IEEE SmartGridComm 2013.

    Tags: 2013
  40. Application-Driven Design for a Secured Smart Grid

    Berthier, R.; Bobba, R.; Heine, E.; Khurana, H.; Sanders, W.H., Yardley, T.

    Smart Grid Communications and Networking, edited by E. Hossain, Z. Han, H.V. Poor, Cambridge University Press, 2012. [Cambridge Catalogue entry]

    Tags: 2012
  41. Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions

    Berthier, R.; Sanders, W. H.; Khurana, H.

    Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, Maryland, Oct. 4-6, 2010, pp. 350-355.1 [IEEE Xplore entry]

    Tags: 2010
  42. Specification-Based Intrusion Detection for Advanced Metering Infrastructures

    Berthier, R.; Sanders, W.H.

    In Proceedings of the 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC), pp.184-193, 12-14 Dec. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  43. Detecting False Data Injection Attacks on DC State Estimation

    Bobba, R. B.; Rogers, K. M.; Wang, Q.; Khurana, H.; Nahrstedt, K.; Overbye, T. J.

    1st Workshop on Secure Control Systems (SCS), April 12, 2010, Stockholm, Sweden.

    Tags: 2010
  44. Exploring a Tiered Architecture for NASPInet

    Bobba, R., Heine, E.; Khurana, H.; Yardley, T.

    Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies (ISGT), Gaithersburg, Maryland, Jan. 19-21, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  45. DLPKH: Distributed Logical Public Key Hierarchy

    Bobba, R.; and Khurana, H.

    Proceedings of the International Conference on Information System Security, p. 110, LNCS vol. 4812, 2007. [SpringerLink entry]

    Tags: 2007
  46. Enhancing Grid Measurements: Wide Area Measurement Systems, NASPInet, and Security

    Bobba, R.; Dagle, J.; Heine, E.; Khurana, H.; Sanders, W.H.; Sauer, P.; Yardley, T.

    IEEE Power and Energy Magazine, vol.10, no.1, pp.67-73, Jan.-Feb. 2012.1 [IEEE Xplore entry]

    Tags: 2012
  47. Attribute-Based Messaging: Access Control and Confidentiality

    Bobba, R.; Fatemieh, O.; Khan, F.; Khan, A.; Gunter, C. A.; Khurana, H.; Prabhakaran, M.

    Attribute-Based Messaging: Access Control and Confidentiality. ACM Trans. Inf. Syst. Secur. 13, 4, Article 31 (December 2010), 35 pages.2 [ACM Digital Library entry]

  48. PBES: A Policy Based Encryption System with Application to Data Sharing in the Power Grid

    Bobba, R.; Khurana, H.; AlTurki, M.; Ashraf, F.

    Proceedings of the 4th International Symposium on Information, Computer, & Communications Security (ASIACCS), Sydney, Australia, March 10-12, 2009, pp. 262-275.2 [ACM Digital Library entry]

    Tags: 2009
  49. Smart Transmission Grid Applications and Their Supporting Infrastructure

    Bose, A.

    IEEE Transactions on Smart Grid, vol. 1, no. 1, June 2010, pp. 11-19.1 [IEEE Xplore entry]

    Tags: 2010
  50. Beyond Planted Bugs in ‘Trusting Trust’: The Input-Processing Frontier

    Bratus, S., Darley, T., Locasto, M., Patterson, M.L., Shapiro, R., Shubina, A.

    IEEE Security & Privacy, vol. 12, no. 1, pp. 83-87, Jan.-Feb. 2014.

    Tags: 2014
  51. Perimeter-Crossing Buses: A New Attack Surface for Embedded Systems

    Bratus, S., Goodspeed, T., Johnson, P. C., Smith, S., and Speers, R.

    in 7th Workshop on Embedded Systems Security (WESS 2012), Tampere, Finland, 11 Oct. 2012. [WESS 2012 online]

    Tags: 2012
  52. TOCTOU, Traps, and Trusted Computing

    Bratus, S.; D'Cunha, N.; Sparks, E.; Smith, S. W.

    Proceedings of the 1st International Conference on Trusted Computing and Trust in Information Technologies (TRUST 2008), Lecture Notes in Computer Science (LNCS) vol. 4968, pp. 14-32, Villach, Austria, March 11-12, 2008, Springer, 2008. [SpringerLink entry]

    Tags: 2008
  53. LZfuzz: A Fast Compression-based Fuzzer for Poorly Documented Protocols

    Bratus, S.; Hansen, A.; Shubina, A.

    Dartmouth Computer Science Technical Report TR2008-634, September 2008. [Dartmouth entry]

    Tags: 2008
  54. New Directions for Hardware-assisted Trusted Computing Policies (Position Paper)

    Bratus, S.; Locasto, M. E.; Ramaswamy, A.; Smith, S. W.

    Proceedings of the 2nd Conference on the Future of Trust in Computing, Berlin, Germany, June 30-July 2, 2008, pp. 30-37. [SpringerLink entry]

    Tags: 2008
  55. Traps, Events, Emulation, and Enforcement: Managing the Yin and Yang of Virtualization-based Security

    Bratus, S.; Locasto, M. E.; Ramaswamy, A.; Smith, S. W.

    Proceedings of the 1st ACM Workshop on Virtual Machine Security (VMSec), Fairfax, Virginia, USA, October 31, 2008, pp. 49-58.2 [ACM Digital Library entry]

    Tags: 2008
  56. VM-based Security Overkill: A Lament for Applied Systems Security Research

    Bratus, S.; Locasto, M.; Ramaswamy, A.; Smith, S. W.

    In Proceedings of the 2010 workshop on New security paradigms (NSPW '10). ACM, New York, NY, USA, 51-60.2 [ACM DL entry]

    Tags: 2010
  57. Robust Implementation of Distributed Algorithms for Control of Distributed Energy Resources

    Cady, S.T.; Domínguez-Garcia, A. D.; Hadjicostis, C.N.

    2011 North American Power Symposium (NAPS), pp.1-5, 4-6 Aug. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  58. Developer-Resistant Cryptography

    Cairns, K. and Steel, G.

    to appear in proceedings of the W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring, London, UK, February 28-March 1, 2014.

    Tags: 2014
  59. Efficient Targeted Key Subset Retrieval in Fractal Hash Sequences

    Cairns, K., Gamage, T., Hauser, C.

    ACM CCS, Berlin, Germany, Nov. 4-8, 2013.

    Tags: 2013
  60. Flexible Data Authentication Evaluated for the Smart Grid

    Cairns, K., Hauser, C., Gamage, T.

    in proceedings of SmartGridComm, Vancouver, Canada, October 2013.

    Tags: 2013
  61. Long-lived Authentication Protocols for Process Control Systems

    Chakravarthy, R.; Hauser, C.; Bakken, D. E.

    International Journal of Critical Infrastructure Protection, vol. 3, nos. 3-4, Dec. 2010, pp. 174-181. [SciVerse entry]

    Tags: 2010
  62. A Framework for Live Forensics

    Chan, E.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, May 2011. [IDEALS entry]

    Tags: 2011, Ph.D. Dissertation
  63. Performing Live Forensics on Insider Attacks

    Chan, E.; Chaugule, A.; Larson, K.; Campbell, R.

    CAE Workshop on Insider Threats, Nov. 2010. [CAE entry]

    Tags: 2010
  64. Forenscope: A Framework for Live Forensics

    Chan, E.; Venkataraman, S.; David, F.; Chaugule, A.; Campbell, R.

    2010 Annual Computer Security Applications Conference (ACSAC 26), Austin, Texas, Dec. 6-10, 2010.2 [ACM Digital Library entry]

    Tags: 2010
  65. Cooperative Congestion Control in Power Grid Communication Networks

    Cherukuri, N.

    Master's Thesis, Department of Computer Science, University of Illinois at Urbana-Champaign, May 2011. [IDEALS entry]

    Tags: 2011, Master's Thesis
  66. Cooperative Congestion Control in Power Grid Communication Networks

    Cherukuri, N.; Nahrstedt, K.

    2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp.587-592, 17-20 Oct. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  67. A Case for Validating Remote Application Integrity for Data Processing Systems

    Chu, J., Montanari, M., Campbell, R.H.

    In proceedings of the International Symposium on Resilient Control Systems, August 2012.1 [IEEE Xplore entry]

    Tags: 2012
  68. Exploring the Integration of Memory Management and Trusted Computing

    D'Cunha, N. A.

    Master's Thesis published as Dartmouth College Department of Computer Science Technical Report TR2007-594, 2007. [Dartmouth entry]

    Tags: 2007, Master's Thesis
  69. Hardware Implementation of Information Flow Signatures Derived via Program Analysis

    Dabrowski, P.; Healey, W.; Pattabiraman, K.; Chen, S.; Kalbarczyk, Z.; Iyer, R.

    Proceedings of the 2nd Workshop on Dependable & Secure Nanocomputing, organized in conjunction with the Conference on Dependable Systems and Networks, DSN'08, 2008. [DSN'08 entry]

    Tags: 2008
  70. Cloud Computing for the Power Grid: From Service Composition to Assured Clouds

    Dan, G., Bobba, R., Gross, G., Campbell, R.

    to appear in the 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud’13), San Jose, CA, June, 2013.

    Tags: 2013
  71. SELINDA: A Secure, Scalable and Lightweight Data Collection Protocol for Smart Grids

    Dan, G., Lui, K., Tabassum, R., Zhu, Q., Nahrstedt, K.

     in proceedings of SmartGridComm, Vancouver, Canada, October 2013.

    Tags: 2013
  72. Multiple-Element Contingency Screening

    Davis, C.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2009. [IDEALS entry]

    Tags: 2009, Ph.D. Dissertation
  73. SCADA Cyber Security Testbed Development

    Davis, C. M.; Tate, J. E.; Okhravi, H.; Grier, C.; Overbye, T. J.; Nicol, D.

    38th North American Power Symposium (NAPS 2006), pp.483-488, 17-19 Sept. 2006.1 [IEEE Xplore entry]

    Tags: 2006
  74. Wide Area Phasor Data Visualization

    Davis, C. M.; Tate, J. E.; Overbye, T. J.

    Proceedings of the 39th North American Power Symposium (NAPS'07), Las Cruces, New Mexico, September 30-October 2, 2007, pp. 246-252.1 [IEEE Xplore entry]

    Tags: 2007
  75. Linear Analysis of Multiple Outage Interaction

    Davis, C.; Overbye, T.

    Proceedings of the 42nd Hawaii International Conference on System Sciences, Waikoloa, Big Island, Hawaii, January 5-8, 2009.1 [IEEE Xplore entry]

    Tags: 2009
  76. Power Flow Cyber Attacks and Perturbation-Based Defense

    Davis, K.R., Morrow, K.L., Bobba, R., Heine, E.

     2012 IEEE International Conference on Smart Grid Communications (SmartGridComm), November 2012.1 [IEEE entry]

    Tags: 2012
  77. Dynamic and Composable Trust for Indirect Interactions

    Dionysiou, I.

    Ph.D. Dissertation, Washington State University, August 2006. [WSU entry]

    Tags: 2006, Ph.D. Dissertation
  78. A Conceptual Framework for Adaptive and Configurable Activity-Aware Trust in Collaborative Environments

    Dionysiou, I.; Bakken, D. E.

    International Journal of Dependable and Trustworthy Information Systems (IJDTIS), vol. 1. no. 1, pp. 25–44, IGI-Global, 2010. [IGI entry]

    Tags: 2010
  79. GUTS: A Framework for Adaptive and Configurable Grid User Trust Service

    Dionysiou, I.; Gjermundrød, H.; H.; Bakken, D.

    Proceedings of the 6th International Workshop on Security and Trust Management (STM), LNCS, vol. 6710/2011, pp. 84-99, Sept. 23–24, 2010, Athens, Greece. [SpringerLink entry]

    Tags: 2010
  80. National Report on Research Directions for Future Cyber Physical Energy Systems

    Domínguez-Garcia, A. D., et al. Networking and Information Technology Research and Development (NITRD), to appear.
  81. Coordination and Control of Distributed Energy Resources for Provision of Ancillary Services

    Domínguez-Garcia, A.D.; Hadjicostis, C.N.

    2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp.537-542, 4-6 Oct. 2010.1 [IEEE Xplore entry]

    Tags: 2010
  82. Small Inverter-Interfaced Distributed Energy Resources for Reactive Power Support

    Domínguez-Garcia, A.D.; Hadjicostis, C.N.; Krein, P.T.; Cady, S.T.

    2011 Twenty-Sixth Annual IEEE Applied Power Electronics Conference and Exposition (APEC), pp.1616-1621, 6-11 March 2011.1 [IEEE Xplore entry]

    Tags: 2011
  83. Hardware Intrusion Detection for Supply-Chain Threats to Critical Infrastructure Embedded System

    Edwards, N.

    Master’s Thesis, University of Illinois at Urbana-Champaign, 2012.

    Tags: 2012, Master's Thesis
  84. Power System Vulnerability Analysis: A Centrality Based Approach Utilizing Limited Information

    Ernster, T.

    Master's Thesis, Washington State University, 2012.

    Tags: 2012, Master's Thesis
  85. Low Cost and Secure Smart Meter Communications Using the TV White Spaces

    Fatemieh, O.; Chandra, R.; Gunter, C. A.

    3rd International Symposium on Resilient Control Systems (ISRCS), pp.37-42, 10-12 Aug. 2010.1 [IEEE Xplore entry

    Tags: 2010
  86. Secure Collaborative Sensing for Crowdsourcing Spectrum Data in White Space Networks

    Fatemieh, O.; Chandra, R.; Gunter, C. A.

    IEEE Symposium on New Frontiers in Dynamic Spectrum, pp.1-12, 6-9 April 2010I1 [IEEE Xplore entry]

    Tags: 2010
  87. Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks

    Fatemieh, O.; Farhadi, A.; Chandra, R.; Gunter, C. A.

    18th Annual Network & Distributed System Security Symposium (NDSS '11), San Diego, CA, Feb. 2011. [NDSS entry]

    Tags: 2011
  88. Cost Modeling of Response Actions for Automated Response and Recovery in AMI

    Fawaz, A., Berthier, R., and Sanders, W. H.

    In Proceedings of the 3rd IEEE International Conference on Smart Grid Communications (SmartGridComm), Tainan City, Taiway, Nov. 5-8, 2012, pp. 348-353.1 [IEEE Xplore entry]

    Tags: 2012
  89. Understanding the Role of Automated Response Actions to Improve AMI Resiliency [Extended Abstract]

    Fawaz, A., Berthier, R., Sanders, W.H., Pal, P.

    In proceedings of the NIST Workshop on Cybersecurity for Cyber-Physical Systems, April 23-24, 2012, Gaithersburg, MD. [NIST Workshop entry]

    Tags: 2012
  90. A Response Taxonomy and Cost Model for Advanced Metering Infrastructures

    Fawaz, M.

    Master's Thesis, University of Illinois at Urbana-Champaign, 2013.

    Tags: 2013, Master's Thesis
  91. Towards a Taxonomy of Attacks Against Energy Control Systems

    Fleury, T.; Khurana, H.; Welch, V.

    in Critical Infrastructure Protection II, The International Federation for Information Processing, vol. 290, Springer US, 2009, pp. 71-85. [SpringerLink entry]

    Tags: 2009
  92. For the Grid and Through the Grid: The Role of Power Line Communications in the Smart Grid

    Galli, S.; Scaglione, A.; Wang, Z.

    Proceedings of the IEEE , vol.99, no.6, pp.998-1027, June 2011.1 [IEEE Xplore entry]

    Tags: 2011
  93. Power Line Communications and the Smart Grid

    Galli, S.; Scaglione, A.; Wang, Z.

    Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, Maryland, Oct. 4-6, 2010, pp. 303-308.1 [IEEE Xplore entry]

    Tags: 2010
  94. Utilizing the Cloud as a Utility for the Advanced Power Grid

    Gamage, T., Anderson, D., Bakken, D., Birman, K., Bose, A., Hauser, C., Maheshwari, K, van Renesse, R.

    to appear as a book chapter in Smart Grids: Clouds, Communication, and Automation, Eds. David Bakken and Kris Iniewski, CRC Press, 2014.

    Tags: 2013
  95. Mitigating Event Confidentiality Violations in Smart Grids: An Information Flow Security-Based Approach

    Gamage, T., Roth, T., McMillin, B., Crow, M.

    IEEE Transactions on Smart Grid, 2013.1 [IEEE entry]

    Tags: 2013
  96. Leveraging the Next-Generation Power Grid: Data Sharing and Associated Partnerships

    Germanus, D.; Dionysiou, I.; Gjermundrød, H.; Khelil, A.; Suri, N.; Bakken, D. E.; Hauser, C.

    IEEE PES Conference on Innovative Smart Grid Technologies Europe, Gothenburg, Sweden, October 11-13, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  97. GridStat: A Flexible QoS-Managed Data Dissemination Framework for the Power Grid

    Gjermundrød, H.; Bakken, D. E.; Hauser, C. H.; Bose, A.

    IEEE Transactions on Power Delivery, vol. 24, no. 1, January 2009, pp. 136-143.1 [IEEE Xplore entry]

    Tags: 2009
  98. Flexible QoS-Managed Status Dissemination Framework for the Electric Power Grid

    Gjermundrød, K.H.

    Ph.D. Dissertation, Washington State University, 2006. [WSU entry]

    Tags: 2006, Ph.D. Dissertation
  99. Packets in Packets: OrsonWelles’ In-Band Signaling Attacks for Modern Radios

    Goodspeed, T.; Bratus, S.; Melgares, R.; Speers, R.; Shapiro, R.

    Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT'11), San Francisco, CA, August 8, 2011. [USENIX entry]

    Tags: 2011
  100. Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters

    Goodspeed, T.; Bratus, S.; Melgares, R.; Speers, R.; Smith, S.W.

    In Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS), January 2012.1 [IEEE CS entry]

    Tags: 2012
  101. Deployment Considerations for Intrusion Detection Systems in Advanced Metering Infrastructure

    Grochocki, D.

    Master’s Thesis, University of Illinois at Urbana-Champaign, May 2013.

    Tags: 2013, Master's Thesis
  102. AMI Threats, Intrusion Detection Requirements and Deployment Recommendations

    Grochocki, D., Huh, J.H., Berthier, R., Bobba, R., Sanders, W.H., Cardenas, A., Jetcheva, J.G.

    In Proceedings of the 3rd IEEE International Conference on Smart Grid Communications (SmartGridComm), Tainan City, Taiwan, Nov. 5-8, 2012, pp. 395-400.1 [IEEE Xplore entry]

    Tags: 2012
  103. Trustworthy Cyber-Infrastructure for Power (TCIP)

    Gunter, C. A.; Sanders, W. H.; Bakken, D. E.; Bose, A.; Campbell, R.; Gross, G.; Hauser, C. H.; Khurana, H.; Iyer, R. K.; Kalbarczyk, Z. T.; Nahrstedt, K.; Nicol, D. M.; Overbye, T. J.; Sauer, P. W.; Smith, S. W.; Thomas, R. J.; Welch, V.; Winslett, M.

    Proceedings of the Workshop on Research Directions for Security and Networking in Critical Real-time and Embedded Systems (CRTES), San Jose, CA, April 2006. [CRTES entry]

    Tags: 2006
  104. Implementation and Instrumentation of a Flash-Worm

    Hanna, S.; Nicol, D. M.

    Proceedings of 2006 DETER Community Workshop, Arlington, VA, June 2006, pp. 91-94. [DETER'06 entry]

    Tags: 2006
  105. Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security

    Harvey, M., Long, D., and Reinhard, K.

    to appear in Power and Energy Conference at Illinois (PECI) 2014.

    Tags: 2014
  106. Analyzing NASPInet Data Flows

    Hasan, R.; Bobba, R.; Khurana, H.

    Proceedings of the IEEE PES Power Systems Conference & Exposition (PSCE), Seattle, Washington, March 15-18, 2009.1 [IEEE Xplore entry]

    Tags: 2009
  107. Synergy: A Trust-aware, Policy-driven Information Dissemination Framework

    Hasan, R.; Winslett, M.

    Proc. IEEE International Conference on Intelligence and Security Informatics (ISI 2006), San Diego, USA, May 23-24, 2006.1

    Tags: 2006
  108. Trust Research to Address Uncertainty in Security for the Smart Grid

    Hauser, C.

    In Proceedings of the 2012 IEEE PES Conference on Innovative Smart Grid Technologies (ISGT), pp. 1-2, 16-20 Jan. 2012.1 [IEEE Xplore entry]

    Tags: 2012
  109. Security, Trust and QoS in Next-generation Control and Communication for Large Power Systems

    Hauser, C. H.; Bakken, D. E.; Dionysiou, I.; Gjermundrød, K. H.; Irava, V. S.; Bose, A.

    Proceedings of the International Workshop on Complex Network and Infrastructure Protection 2006, Rome, Italy, March 2006. [CNIP'06 Program]

    Tags: 2006
  110. Security, Trust and QoS in Next-generation Control and Communication for Large Power Systems

    Hauser, C. H.; Bakken, D. E.; Dionysiou, I.; Gjermundrød, K. H.; Irava, V. S.; Helkey, J. and Bose, A.

    International Journal of Critical Infrastructures, vol. 4, no. 1/2, pp. 3-16, 2008. [InderScience entry]

    Tags: 2008
  111. Evaluating Multicast Message Authentication Protocols for Use in Wide Area Power Grid Data Delivery Services

    Hauser, C.; Manivannan, T.; Bakken, D.

    In Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS), January 2012.1 [IEEE CS entry]

    Tags: 2012
  112. SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks

    He, W.; Huang, Y.; Sathyam, R.; Nahrstedt, K.; Lee, W. C.

    IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, March 2009, pp. 140-150.1 [IEEE Xplore entry]

    Tags: 2009
  113. SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks

    He, W.; Huang, Y.; Sathyam, R.; Nahrstedt, K.; Lee, W. C.

     Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '07), pp.201-210, 19-23 March 2007.1 [IEEE Xplore entry]

    Tags: 2007
  114. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks

    He, W.; Liu, X.; Nguyen, H.; Nahrstedt, K.; Abdelzaher, T.

    Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), Anchorage, Alaska, May 6-12, 2007, pp. 2045-2053.1 [IEEE Xplore entry]

    Tags: 2007
  115. Exploring Convergence for SCADA Networks

    Heine, E.; Khurana, H.; Yardley, T.

    2011 IEEE PES Innovative Smart Grid Technologies (ISGT), pp.1-8, 17-19 Jan. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  116. Achieving End-to-End Delay Bounds in a Real-Time Status Dissemination Network

    Helkey, J. N.

    Master's Thesis, Washington State University, May 2007.

    Tags: 2007, Master's Thesis
  117. Faerieplay on Tiny Trusted Third Parties (Work in Progress)

    Iliev, A.; Smith, S. W.

    Proceedings of the Second Workshop on Advances in Trusted Computing: WATC '06 Fall (online), 2006. [online proceedings]

    Tags: 2006
  118. Small, stupid, and scalable: secure computing with faerieplay

    Iliev, A.; Smith, S.W.

    In Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing (STC '10). ACM, New York, NY, USA, 41-52.2 [ACM DL entry]

    Tags: 2010
  119. Low-cost Delay-constrained Multicast Routing Heuristics and Their Evaluation

    Irava, V. S.

    Ph.D. Dissertation, Washington State University, August 2006. [WSU entry]

    Tags: 2006, Ph.D. Dissertation
  120. Toward Application-Aware Security and Reliability

    Iyer, R.; Kalbarczyk, Z.; Pattabiraman, K.; Healey, W.; Klemperer, P.; Farivar, R.

    IEEE Security & Privacy, vol. 5, no. 1, 2007, pp. 57-62.1 [IEEE Xplore entry]

    Tags: 2007
  121. Speaking the Local Dialect: Exploiting Differences Between IEEE 802.15.4 Receivers with Commodity Radios for Fingerprinting, Targeted Attacks, and WIDS Evasion

    Jenkins, I., Shapiro, R., Bratus, S., Goodspeed, T., Speers, R., and Dowd, D.

     Dartmouth Computer Science Technical Report TR2014-749, March 2014.

    Tags: 2014
  122. Fingerprinting IEEE 802.15.14 Devices with Commodity Radios

    Jenkins, I.R., Shapiro, R., Bratus, S., Speers, R.

    Dartmouth Computer Science Technical Report TR2014-746, March 2014.[Dartmouth entry]

    Tags: 2014
  123. Spoofing GPS Receiver Clock Offset of Phasor Measurement Units

    Jiang, X.

    Master’s Thesis, University of Illinois at Urbana-Champaign, 2012. 

    Tags: 2012, Master's Thesis
  124. Spoofing GPS Receiver Clock Offset of Phasor Measurement Units

    Jiang, X., Harding, B., Makela, J., Dominguez-Garcia, A.D.

    Coordinated Science Laboratory Technical Report UILU-ENG-12-2205, June 2012. 

    Tags: 2012
  125. Spoofing GPS Receiver Clock Offset of Phasor Measurement Units

    Jiang, X., Zhang, J., Harding, B., Makela, J., Dominguez-Garcia, A.D.

    IEEE Transactions on Power Systems, vol. PP, no.99, pp.1,10.1 [IEEE Xplore entry]

    Tags: 2013
  126. Efficient Ethernet Switch Models for Large-Scale Network Simulation

    Jin, D.

    Master's Thesis, University of Illinois at Urbana-Champaign, 2010. [IDEALS entry]

    Tags: 2010, Master's Thesis
  127. Network-Simulation-Based Evaluation of Smart Grid Applications

    Jin, D.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2013.

    Tags: 2013, Ph.D. Dissertation
  128. Parallel Simulation of Software Defined Networks

    Jin, D., Nicol, D.M.,

    ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS), Montreal, Canada, 2013.2  [ACM entry]

    Tags: 2013
  129. A Parallel Network Simulation and Virtual-Time-Based Network Emulation Testbed

    Jin, D., Zheng, Y., Nicol, D.M.

    To appear in the Journal of Simulation, 2013.

    Tags: 2013
  130. Virtual Time Integration of Emulation and Parallel Simulation

    Jin, D., Zheng, Y., Zhu, H., Nicol, D.M., Winterrowd, L.

    In Proceedings of the 26th IEEE Workshop on Principles of Advanced and Distributed Simulation (PADS), 2012.1 [IEEE Xplore Entry]

    Tags: 2012
  131. Fast Simulation of Background Traffic through Fair Queueing Networks

    Jin, D.; Nicol, D. M.

    Proceedings of the 2010 Winter Simulation Conference (WSC), Baltimore, MD, December, 2010.1 [WSC entry]

    Tags: 2010
  132. An Event Buffer Flooding Attack in DNP3 Controlled SCADA Systems

    Jin, D.; Nicol, D.M.; Yan, G.

    In Proceedings of the 2011 Winter Simulation Conference (WSC2011), Phoenix, AZ, Dec. 11-14, 2011. [WSC entry]

    Tags: 2011
  133. Efficient Gigabit Ethernet Switch Models for Large-scale Simulation

    Jin, K.; Nicol, D.; Caesar, M.

    Proceedings of the 24th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation, Atlanta, GA, May 17-19, 2010, online.1 2 [IEEE Xplore entry]

    Tags: 2010
  134. Nymble: Anonymous IP-Address Blocking

    Johnson, P.; Kapadia, A.; Tsang, P.; Smith, S. W.

    Proceedings of the 7th International Symposium on Privacy-Enhancing Technologies, Lecture Notes in Computer Science (LNCS) vol. 4776, pp. 113-133, Ottawa, Canada, June 20-22, 2007. [SpringerLink entry]

    Tags: 2007
  135. Attribute-Based Publishing with Hidden Credentials and Hidden Policies

    Kapadia, A.; Tsang, P.; Smith, S. W.

    Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS '07), Feb. 2007, pp. 179-192. [NDSS entry]

    Tags: 2007
  136. Theory and Logic for Security Assessment of Cyberinfrastructures

    Katasani, S. S. R.

    Master's Thesis, University of Illinois at Urbana-Champaign, 2007.

    Tags: 2007, Master's Thesis
  137. Tiered Incentives for Integrity Based Queuing

    Khan, F.; Gunter, C. A.

     In Proceedings of the 2010 Workshop on Economics of Networks, Systems, and Computation (NetEcon '10), Vancouver, BC, Canada, October 2010.2 [ACM DL entry]

    Tags: 2010
  138. Diagnostic Powertracing for Sensor Node Failure Analysis

    Khan, M. M. H.; Le, H. K.; LeMay, M.; Moinzadeh, P.; Wang, L.; Yang, Y.; Noh, D. K.; Abdelzaher, T.; Gunter, C. A.; Han, J.; Jin, X.

    ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN '10), Stockholm, Sweden, April 2010.1, 2 [ACM DL entry]

    Tags: 2010
  139. Operational Security Requirements for Large Collaborative Compute Infrastructures

    Khurana, H.; Basney, J.; Welch, V.; Campbell, R.

    International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2006), Trusted Collaboration Workshop (TrustCol), pp.1-7, 17-20 Nov. 2006.1 [IEEE Xplore entry]

    Tags: 2006
  140. Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols

    Khurana, H.; Bobba, R.; Yardley, T.; Agarwal, P.; Heine, E.

    In Proceedings of the Forty-Third Annual Hawaii International Conference on System Sciences, Honolulu, Hawaii, January 5-8, 2010.1 [Tags: 2010

  141. Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid

    Khurana, H.; Khan, M. M. H.; Welch, V.

    Proc. Hawaii International Conference on System Sciences (HICSS), Hawaii, January 3-6, 2007.1 [IEEE Xplore entry]

    Tags: 2007
  142. Enhanced Measurement Based Dynamic Equivalence Using Coherency Identification

    Kim, S., Overbye, T.

    IEEE Power and Energy Conference at Illinois (PECI), February, 2013.1 [IEEE entry]

    Tags: 2013
  143. Mixed Power Flow Analysis Using AC and DC Models

    Kim, S., Overbye, T.J.

    in IET Generation, Transmission, and Distribution, Vol. 6, no. 10, October, 2012.1 [IEEE Xplore entry]

    Tags: 2012
  144. Hybrid power flow analysis: Combination of AC and DC models

    Kim, S.; Overbye, T.J.

    2011 IEEE Power and Energy Conference at Illinois (PECI), pp.1-4, 25-26 Feb. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  145. Investigating Synchrophasor Data Quality Issues

    Kirihara, K., Yoon, A., and Reinhard, K.

    to appear in Power and Energy Conference at Illinois (PECI) 2014.

    Tags: 2014
  146. On the Problem of Adding Infinitely Many Values

    Kirti, S.; Scaglione, A.

    Proceedings of the IEEE 10th International Symposium on Spread Spectrum Techniques and Applications (ISSSTA '08), Bologna, Italy, Aug. 25-28, 2008, pp.173-181.1 [IEEE Xplore entry]

    Tags: 2008
  147. Scalable Distributed Kalman Filtering Through Consensus

    Kirti, S.; Scaglione, A.

    International Conference on Acoustics, Speech and Signal Processing (ICASSP 2008), pp.2725-2728, March 31 2008-April 4 2008.1 [IEEE Xplore entry]

    Tags: 2008
  148. A Scalable Wireless Communication Architecture for Average Consensus

    Kirti, S.; Scaglione, A.; Thomas, R. J.

    invited paper, Proceedings of the 46th IEEE Conference on Decision and Control (CDC), New Orleans, LA, Dec. 12-14, 2007, pp. 32-37.1 [IEEE Xplore entry]

    Tags: 2007
  149. On the Communication Architecture for Wide-Area Real-Time Monitoring in Power Networks

    Kirti, S.; Wang, Z.; Scaglione, A.; Thomas, R.

    Proc. 40th Annual Hawaii International Conference on System Sciences, 2007 (HICSS 2007), Jan. 3-6, 2007.1 [IEEE CS entry]

    Tags: 2007
  150. Lossless Compression of Synchronized Phasor Measurements

    Klump, R.; Agarwal, P. Tate, J. E.; Khurana, H.

    Proc. 2010 IEEE Power & Energy Society (PES) General Meeting, Minneapolis, Minnesota, July 25-29, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  151. Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures

    Kosut, O.; Jia, L.; Thomas, R. J.; Tong, L.

    Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, Maryland, Oct. 4-6, 2010, pp. 220-225.1 [IEEE Xplore entry]

    Tags: 2010
  152. On Malicious Data Attacks on Power System State Estimation

    Kosut, O.; Jia, L.; Thomas, R. J.; Tong, L.

    Proceedings of the 45th International Universities' Power Engineering Conference (UPEC 2010), Cardiff, Wales, UK, Aug. 31-Sept. 3, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  153. Reinforcement Learning Techniques for Controlling Resources in Power Networks

    Kowli, A.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2013.

    Tags: 2013, Ph.D. Dissertation
  154. Power Node Control for Renewable Integration

    Kowli, A., Meyn, S.

    In Proceedings of the 2012 IEEE PES General Meeting, San Diego, California, July 22-26, 2012.1

    Tags: 2012
  155. Quantifying the Variable Effects of Systems with Demand Response Resources

    Kowli, A.; Gross, G.

    Proceedings of the IREP Symposium: Bulk Power System Dynamics and Control Symposium VIII, pp. 1-10, Búzios, Rio de Janeiro, Brazil, Aug. 1-6, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  156. Supporting Wind Generation Deployment with Demand Response

    Kowli, A.; Meyn, S.

    In Proceedings of the 2011 IEEE Power and Energy Society General Meeting, pp.1-8, 24-29 July 2011.1 [IEEE Xplore entry]

    Tags: 2011
  157. Customer-centric Energy Usage Data Management and Sharing in Smart Grid Systems

    Lahoti, G., Mashima, D., and Chen, W.P.

    to appear in the Proceedings of Smart Energy Grid Security Workshop (SEGS 2013), November 2013.

    Tags: 2013
  158. Defeasible Security Policy Composition for Web Services

    Lee, A. J.; Boyer, J. P.; Olson, L. E.; Gunter, C. A.

    Proceedings of the 4th ACM Workshop on Formal Methods in Security Engineering (FMSE 2006) held in conjunction with the 13th ACM Conference on Computer and Communications Security (CCS 2006), November 2006, pp. 45-54.2 [ACM DL entry]

    Tags: 2006
  159. Confidentiality-Preserving Distributed Proofs of Conjunctive Queries

    Lee, A. J.; Minami, K.; Borisov, N.

    Proceedings of the 4th International Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, March 10-12, 2009, pp. 287-297.2 [ACM DL entry]

    Tags: 2009
  160. Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees (Extended Version)

    Lee, A. J.; Minami, K.; Winslett, M.

    University of Illinois at Urbana-Champaign Department of Computer Science Technical Report No. UIUCDCS-R-2007-2839, April 2007. [IDEALS entry]

    Tags: 2007
  161. Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees

    Lee, A. J.; Minami, K.; Winslett, M.,

    Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (SACMAT 2007), Sophia Antipolis, France, June 20-22, 2007, pp. 101-110.2 [ACM DL entry]

    Tags: 2007
  162. Automated Trust Negotiation in Open Systems

    Lee, A. J.; Seamons, K. E.; Winslett, M.; Yu, T.

    in Secure Data Management in Decentralized Systems, Ting Yu and Sushil Jajodia (editors), Berlin: Springer, 2007, pp. 217-258. [SpringerLink entry]

    Tags: 2007
  163. A Privacy-Preserving Interdomain Audit Framework

    Lee, A. J.; Tabriz, P.; Borisov, N.

    Proceedings of the 5th ACM Workshop on Privacy in the Electronic Society (WPES 2006) held in conjunction with the 13th ACM Conference on Computer and Communications Security (CCS 2006), October 2006.2 [ACM DL entry]

    Tags: 2006
  164. Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems

    Lee, A. J.; Winslett, M.

    ACM Transactions on Information and System Security, vol. 12, no. 2, December 2008, article no. 8.2 [ACM DL entry]

    Tags: 2008
  165. Open Problems for Usable and Secure Open Systems

    Lee, A. J.; Winslett, M.

    Proceedings of the Workshop on Usability Research Challenges for Cyberinfrastructure and Tools held in conjunction with ACM CHI 2006, April 2006.2

    Tags: 2006
  166. Safety and Consistency in Policy-Based Authorization Systems

    Lee, A. J.; Winslett, M.

    Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, Virginia, October 30-November 3, 2006, pp. 124-133.2 [ACM DL entry]

    Tags: 2006
  167. Safety and Consistency in Policy-Based Authorization Systems (Extended Version)

    Lee, A. J.; Winslett, M.

    University of Illinois at Urbana-Champaign Department of Computer Science Technical Report No. UIUCDCS-R-2006-2761, August 2006. [IDEALS entry]

    Tags: 2006
  168. Towards an Efficient and Language-Agnostic Compliance Checker for Trust Negotiation Systems

    Lee, A. J.; Winslett, M.

    Proceedings of the 3rd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), 2008.2 [ACM DL entry]

    Tags: 2008
  169. Towards an Efficient and Language-Agnostic Compliance Checker for Trust Negotiation Systems

    Lee, A. J.; Winslett, M.

    University of Illinois at Urbana-Champaign Department of Computer Science Technical Report No. UIUCDCS-R-2007-2903, 2007. [IDEALS entry]

    Tags: 2007
  170. Towards Standards-Compliant Trust Negotiation for Web Services

    Lee, A. J.; Winslett, M.

    Proceedings of the Joint iTrust and PST Conferences on Privacy, Trust Management, and Security (IFIPTM 2008), 2008. [SpringerLink entry]

    Tags: 2008
  171. Towards Standards-Compliant Trust Negotiation for Web Services (Extended Version)

    Lee, A. J.; Winslett, M.

    University of Illinois at Urbana-Champaign Department of Computer Science Technical Report No. UIUCDCS-R-2008-2944, 2008. [IDEALS entry]

    Tags: 2008
  172. Virtual Fingerprinting as a Foundation for Reputation in Open Systems

    Lee, A. J.; Winslett, M.

    University of Illinois at Urbana-Champaign Department of Computer Science Technical Report No. UIUCDCS-R-2006-2691, February 2006. (This is a greatly extended version of the conference paper.) [IDEALS entry]

    Tags: 2006
  173. Virtual Fingerprinting as a Foundation for Reputation in Open Systems

    Lee, A. J.; Winslett, M.

    Proc. Fourth International Conference on Trust Management (iTrust 2006), May 2006.2 [ACM DL entry]

    Tags: 2006
  174. The Traust Authorization Service

    Lee, A. J.; Winslett, M.; Basney, J.; Welch, V.

    ACM Transactions on Information and System Security, vol. 11, no. 1, p. 1, 2008.2 [ACM DL entry]

    Tags: 2008
  175. Traust: A Trust Negotiation Based Authorization Service

    Lee, A. J.; Winslett, M.; Basney, J.; Welch, V.

    (Demonstration Short Paper), Proc. Fourth International Conference on Trust Management (iTrust 2006), May 2006.2 [ACM DL entry]

    Tags: 2006
  176. Traust: A Trust Negotiation-Based Authorization Service for Open Systems

    Lee, A. J.; Winslett, M.; Basney, J.; Welch, V.

    Proc. Eleventh ACM Symposium on Access Control Models and Technologies (SACMAT 2006), June 2006, pp. 39-48.2 [ACM DL entry]

    Tags: 2006
  177. TrustBuilder2: A Reconfigurable Framework for Trust Negotiation

    Lee, A. J.; Winslett, M.; Perano, K. J.

    Proceedings of the 3rd IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2009), West Lafayette, Indiana, June 15-19, 2009, pp. 176-195. [SpringerLink entry]

    Tags: 2009
  178. On the Consistency of Distributed Proofs with Hidden Subtrees

    Lee, A.; Minami, K.; Winslett, M.

    ACM Transactions on Information and System Security, vol. 13, no. 3, Article 25, July 2010.2 [ACM DL entry]

  179. Dependable Emergency-Response Networking Based on Retaskable Network Infrastructures

    LeMay, M. D.

    Master's Thesis, University of Illinois at Urbana-Champaign, 2008.

    Tags: 2008, Master's Thesis
  180. Cumulative Attestation Kernels for Embedded Systems

    Lemay, M., Gunter, C.A.

    IEEE Transactions on Smart Grid, vol. 3, no. 2, pp. 744-760, June 2012.1 [IEEE Xplore entry]

    Tags: 2012
  181. Unified Architecture for Large-Scale Attested Metering

    LeMay, M.; Gross, G.; Gunter, C. A.; Garg, S.

    Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS'07), pp. 115, Jan. 3-6, 2007.1 [IEEE Xplore entry]

    Tags: 2007
  182. Supporting Emergency-Response by Retasking Network Infrastructures

    LeMay, M.; Gunter, C. A.

    Sixth Workshop on Hot Topics in Networking (HotNets-VI), Atlanta, GA, Nov. 14-15, 2007. [HotNets-VI entry].

    Tags: 2007
  183. Collaborative Recommender Systems for Building Automation

    LeMay, M.; Haas, J. J.; Gunter, C. A.

    Proceedings of the 42nd Hawaii International Conference on System Sciences, Waikoloa, Big Island, Hawaii, January 5-8, 2009.1 [IEEE Xplore entry]

    Tags: 2009
  184. An Integrated Architecture for Demand Response Communications and Control

    LeMay, M.; Nelli, R.; Gross, G.; Gunter, C. A.

    (received best paper award), Proceedings of the 41st Annual Hawai'i International Conference on System Sciences, January 7-10, 2008.1 [IEEE CS entry]

    Tags: 2008
  185. FADEC: Fast Authentication for Dynamic Electric Vehicle Charging

    Li, H., Dán, G., Nahrstedt, K.

    to appear in IEEE Communications and Network Security (CNS) 2013.

    Tags: 2013
  186. Robust Collaborative State Estimation for Smart Grid Monitoring

    Li, X. and Scaglione, A.

    to appear in proceedings of IEEE ICASSP 2013, Vancouver, Canada.1

    Tags: 2013
  187. Robust Decentralized State Estimation and Tracking for Power Systems via Network Gossiping

    Li, X. and Scaglione, A.

    to appear in the IEEE Journal on Selected Areas in Communications.1

    Tags: 2013
  188. Convergence and Applications of a Gossip-based Gauss-Newton Algorithm

    Li, X., and Scaglione, A.

    in proceedings of the IEEE Transactions on Signal Processing (arXiv 1210.0056).1 [IEEE Xplore entry]

    Tags: 2013
  189. Robust Decentralized State Estimation and Tracking for Power Systems via Network Gossiping

    Li, X., and Scaglione, A.

    IEEE Journal on Selected Areas in Communications (JSAC), vol. 31, no. 7, pp. 1184-1194, July 2013.

    Tags: 2013
  190. Blind Topology Identification for Power Systems

    Li, X., Poor, H. V., and Scaglione, A.

    to appear in proceedings of SmartGridComm, Vancouver, Canada, October 2013.

    Tags: 2013
  191. Optimal Sensor Placement for Hybrid State Estimation in Smart Grid

    Li, X., Scaglione, A. and Chang, T-H

    to appear in proceedings of IEEE ICASSP 2013, Vancouver, Canada.1

    Tags: 2013
  192. A Framework for Phasor Measurement Placement in Hybrid State Estimation Via Gauss-Newton

    Li, X., Scaglione, A., and Chang, T.-H.

    to appear in IEEE Transactions on Power Systems.1 [IEEE Xplore entry]

    Tags: 2013
  193. Decentralized Data Processing and Management in Smart Grid via Gossiping

    Li, X., Wang, Z., Scaglione, A.

    In Proceedings of the 2012 IEEE Sensory Array and Multichannel Signal Processing Workshop (SAM 2012), Hoboken, New Jersey, June 17-20, 2012.1

    Tags: 2012
  194. Adapting Bro into SCADA: Building Specification-based Intrusion Detection System for DNP3 Protocol

    Lin, H., Kalbarczyk, Z., Iyer, R.K.

    Coordinated Science Laboratory Technical Report UILU-ENG-12-2206, July 2012.

    Tags: 2012
  195. Adapting Bro into SCADA: Building a Specification-based Intrusion Detection System for the DNP3 Protocol

    Lin, H., Slagell, A., Di Martino, C., Kalbarczyk, Z., and Iyer, R.

    in Proceedings of 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW), Oak Ridge, TN, Jan. 8-10, 2013. [CSIIRW 2013 online]

    Tags: 2013
  196. Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids

    Lin, H., Slagell, A., Kalbarczyk, Z., Sauer, P., and Iyer, R.

    in proceedings of Smart Energy Grid Security Workshop, SEGS 2013, Berlin, Germany, November 8, 2013.

    Tags: 2013
  197. Estimate Feeder Topology and Branch Impedances Using Smart Meter Data

    Liu, H., Overbye, T.

    to appear in proceedings of the Power and Engineering Conference at Illinois (PECI 013), February, 2013.

    Tags: 2013
  198. Smart-Grid-Enabled Distributed Reactive Power Support with Conservation Voltage Reduction

    Liu, H., Overbye, T.J.

    to appear in Power and Energy Conference at Illinois (PECI), 2014 IEEE, 28 Feb. – 1 Mar. 2014.

    Tags: 2014
  199. Smart-Grid-Enabled Distributed Reactive Power Support with Conservation of Voltage Reduction

    Liu, H.J.

    M.S. Thesis, Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, 2013.

    Tags: 2013, Master's Thesis
  200. An End-to-end Approach for the Automatic Derivation of Application-Aware Error Detectors

    Lyle, G.; Chen, S.; Pattabiraman, K.; Kalbarczyk, Z.; Iyer, R.

    Proceedings of the IEEE International Conference on Dependable Systems and Networks (DSN), Estoril, Lisbon, Portugal, June 29-July 2, 2009, pp. 584-589.1 [IEEE Xplore entry]

    Tags: 2009
  201. Evaluation and Comparison of Multicast Message Authentication Protocols for Use in Power Grid Applications

    Manivannan, T.

    Master's Thesis. Washington State University, December 2011.

    Tags: 2011, Master's Thesis
  202. Attribute-Based, Usefully Secure Email

    Masone, C. P.

    Ph.D. Dissertation. Dartmouth Computer Science Technical Report TR2008-633, August 2008.

    Tags: 2008, Ph.D. Dissertation
  203. ABUSE: PKI for Real-World Email Trust

    Masone, C.; Smith, S. W.

    Proceedings of the Sixth European Workshop on Public Key Services (EuroPKI'09), Lecture Notes in Computer Science (LNCS), 2010, vol. 6391/2010, pp. 146-162. [SpringerLink entry]

    Tags: 2009
  204. 802.15.4/ZigBee Analysis and Security: tools for practical exploration of the attack surface

    Melgares, R.A.

    Senior Honors Thesis, Dartmouth College, March 2007. Dartmouth College Department of Computer Science Technical Report TR2011-689, January 2011. [Dartmouth entry]

    Tags: 2011, Senior Honors Thesis
  205. The Value of Volatile Resources in Electricity Markets

    Meyn, S.; Negrete-Pincetic, M.; Wang, G.; Kowli, A.; Shafieepoorfard, E.

    Proceedings of the 49th IEEE Conference on Decision and Control, Atlanta, Georgia, Dec. 15-17, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  206. Safety in Discretionary Access Control for Logic-based Publish-subscribe Systems

    Minami, K.; Borisov, N.; Gunter, C. A.

    Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, June 3-5, 2009, pp. 3-12.2 [ACM Digital Library entry]

    Tags: 2009
  207. Distributed Proof Systems for Cross-Domain Authorization

    Minami, K.; Kotz, D.

    Information Assurance, Security and Privacy Services (H. R. Rao & S. Upadhyaya, Eds.), Handbooks in Information Systems vol. 4, pp. 3-40. Bingley, UK: Emerald Group Publishing Limited, 2009. [Emerald etnry]

    Tags: 2009
  208. Secure Aggregation in a Publish-Subscribe System

    Minami, K.; Lee, A. J.; Winslett, M.; Borisov, N.

    Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, Alexandria, Virginia, October 27, 2008, pp. 95-104.2 [ACM Digital Library entry]

    Tags: 2008
  209. Using Smart Devices to Provide Distributed Reactive Power Support

    Mohapatra, S.; Recio, C.; Overbye, T.J.

    2011 North American Power Symposium (NAPS), pp.1-5, 4-6 Aug. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  210. Multi-Organization Policy-based Monitoring

    Montanari, M., Cook, L., Campbell, R.H.

    In Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2012), Chapel Hill, NC, July 16-19, 2012.1 [IEEE Xplore entry]

    Tags: 2012
  211. Attack-resilient Compliance Monitoring for Large Distributed Infrastructure Systems

    Montanari, M.; Campbell, R.H.

    2011 5th International Conference on Network and System Security (NSS), pp.192-199, 6-8 Sept. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  212. Distributed Security Policy Conformance

    Montanari, M.; Chan, E.; Larson, K.; Yoo, W.; Campbell, R.

    In Proceedings of the IFIP International Information Security Conference (IFIP SEC 2011), Lucerne, Switzerland, June 7-9, 2011, Vol. 354, pp. 210-222. [SpringerLink entry]

    Tags: 2011
  213. Confidentiality of Event Data in Policy-based Monitoring

    Montonari, M., Campbell, R.H.

    In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, MA, June 25-28, 2012.1 [IEEE Xplore entry]

    Tags: 2012
  214. Topology Perturbation for Detecting Malicious Data Injection

    Morrow, K.; Heine, E.; Rogers, K.M.; Bobba, R.; Overbye, T.

    In Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS), January 2012.1 [IEEE CS entry]

    Tags: 2012
  215. System Implementation of a Real-time, Content based Application Router for a Managed Publish-Subscribe System

    Muthuswamy, S.

    Master's Thesis, Washington State University, 2008.

    Tags: 2008, Master's Thesis
  216. Security Challenges of Reconfigurable Devices in the Power Grid

    Myagmar, S.; Campbell, R.; Winslett, M.

    Proceedings of the International Conference on Critical Infrastructure Protection, March 2007, vol. 253, pp. 147-160. [SpringerLink entry]

    Tags: 2007
  217. Processor-level Selective Replication

    Nakka, N.; Pattabiraman, K.; Iyer, R.

    Proceedings of the Int'l Conference on Dependable Systems and Networks, DSN'07, p. 544, 2007.1 [IEEE Xplore entry]

    Tags: 2007
  218. Reliability Considerations from the Integration of Smart Grid

    NERC (North American Electric Reliability Corporation) (A. D. Domínguez-Garcia, contributor)

    December 2010.

    Tags: 2010
  219. Alibi Framework for Identifying Insider Jamming Attacks in Half-Duplex Wireless Local Area Networks

    Nguyen, H.

    Ph.D. thesis, University of Illinois at Urbana-Champaign, 2010. [IDEALS entry]

    Tags: 2010
  220. Attack Containment Framework for Large-Scale Critical Infrastructures

    Nguyen, H.; Nahrstedt, K.

    Proceedings of the 16th International Conference on Computer Communications and Networks (ICCCN), Honolulu, Hawaii, August 13-16, 2007, pp. 442-449.1 [IEEE Xplore entry]

    Tags: 2007
  221. Data Aggregation in SCADA Networks

    Nguyen, H.; Nahrstedt, K.

    (abstract), Proc. 1st Midwest Security Workshop, May 6, 2006.

    Tags: 2006
  222. Alibi Framework for Identifying Reactive Jamming Nodes in Wireless LAN

    Nguyen, H.; Pongthawornkamol, T.; Nahrstedt, K.

    In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2011), pp.1-6, 5-9 Dec. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  223. Identifying Insider-based Jammers in Multi-channel Wireless Networks

    Nguyen, H.; Pongthawornkamol, T.; Nahrstedt, K.

    Proceedings of IEEE GLOBECOM 2010, Miami, Florida, Dec. 6-10, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  224. Analysis of Local Address Scanning by Puppetnets

    Nicol, D. M.

    Proceedings of the 2007 Conference on Quantitative Evaluation of Systems, Edinburgh, Scotland, pp. 259-268, 2007.1 [IEEE Xplore entry]

    Tags: 2007
  225. Efficient Simulation of Internet Worms

    Nicol, D. M.

    ACM Transactions on Modeling and Computer Simulation, vol. 18, no. 2, April 2008.2 [ACM Digital Library entry]

    Tags: 2008
  226. The Impact of Stochastic Variance on Worm Propagation and Detection

    Nicol, D. M.

    Proceedings of the 4th ACM Workshop on Recurring Malcode, Alexandria, VA, November 2006, pp. 57-64.2 [ACM Digital Library entry]

    Tags: 2006
  227. Top Speed of Flash Worms Revisited

    Nicol, D. M.

    Proceedings of the European Modeling and Simulation Symposium (EMSS2006), Barcelona, Spain, October 2006, pp. 21-30.

    Tags: 2006
  228. Tradeoffs Between Model Abstraction, Execution Speed, and Accuracy

    Nicol, D. M.

    Proceedings of the European Modeling and Simulation Symposium (EMSS2006), Barcelona, Spain, October 2006, pp. 13-20.

    Tags: 2006
  229. Modeling and Analysis of Worm Defense Using Stochastic Activity Networks

    Nicol, D. M.; Hanna, S.; Stratton, F.; Sanders, W.

    Proceedings of the 2007 Symposium on Simulation of System Security, Norfolk, VA, 2007.2 [ACM Digital Library entry]

    Tags: 2007
  230. Experiences Validating the Access Policy Tool in Industrial Settings

    Nicol, D. M.; Sanders, W. H.; Seri, M.; Singh, S.

    In Proceedings of the Forty-Third Annual Hawaii International Conference on System Sciences, Honolulu, Hawaii, January 5-8, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  231. Detection of Nuclear Material at Border Crossings by Correlating Movement and Radiation Measurements

    Nicol, D. M.; Tsang, R.; Ammerlahn, H.; Johnson, M.

    Proceedings of the 2006 Winter Simulation Conference, Monterey, CA, December 3-6, 2006, pp. 536-544.1 [IEEE Xplore entry]

    Tags: 2006
  232. Sensor Fusion Algorithms for the Detection of Nuclear Material at Border Crossings

    Nicol, D. M.; Tsang, R.; Ammerlahn, H.; Johnson, M.

    in Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V, edited by Edward M. Carapezza, vol. 6201 of the Proceedings of SPIE, Orlando, FL, May 2006, pp. 62011O. [SPIE Digital Library entry]

    Tags: 2006
  233. Models and Analysis of Active Worm Defense

    Nicol, D.; Liljenstam, M.

    Proceedings of Mathematical Methods, Models and Architectures for Computer Networks Security Workshop, St. Petersburg, Russia, September 2005, V. Gorodetsky, I. Kotenko, and V. Skormin (Eds.): MMM-ACNS 2005, LNCS 3685, pp. 38-53. [SpringerLink entry]

    Tags: 2005
  234. Advanced Concepts in Network Simulation

    Nicol, D.; Liljenstam, M.; Liu, J.

    Proceedings of 2005 Winter Simulation Conference, Orlando, FL, December 2005.1 [IEEE Xplore entry]

    Tags: 2005
  235. Usable Global Network Access Policy for Process Control Systems

    Nicol, D.; Sanders, W.; Seri, M.; Singh, S.

    IEEE Security & Privacy, vol. 6, no. 6, pp. 30-36, November-December 2008.1 [IEEE Xplore entry]

    Tags: 2008
  236. S3F: The Scalable Simulation Framework Revisited

    Nicol, D.M.; Jin, D.; Zheng, Y.

    In Proceedings of the 2011 Winter Simulation Conference (WSC2011), Phoenix, AZ, Dec. 11-14, 2011. [WSC entry]

    Tags: 2011
  237. Privacy Protection Through Limited Load Signal Distortion

    Nicol, T.

    Master's Thesis, Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, May 2011. [IDEALS entry]

    Tags: 2011, Master's Thesis
  238. Toward Technological Defenses Against Load Monitoring Techniques

    Nicol, T.; Overbye, T. J.

    Proc. North American Power Symposium, Arlington, Texas, Sept. 26-28, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  239. Malicious Data Detection in State Estimation Leveraging System Losses & Estimation of Perturbed Parameters

    Niemira, W., Bobba, R.B., Sauer, P., Sanders, W.H.

    to appear in proceedings of IEEE SmartGridComm 2013.

    Tags: 2013
  240. Exploiting the hard-working DWARF: Trojan and Exploit Techniques With No Native Executable Code

    Oakley, J.; Bratus, S.

    Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT'11), San Francisco, CA, August 8, 2011. [USENIX entry]

    Tags: 2011
  241. Application of Trusted Network Technology to Industrial Control Network

    Okhravi, H.; Nicol, D. M.

    Proceedings of the 2nd IFIP WG 11.10 International Conference on Critical Infrastructure Protection, (Fairfax, VA, 2008), International Journal of Critical Infrastructure Protection, vol. 2, no. 3, pp. 84-94, 2009. [SciVerse entry]

    Tags: 2008
  242. Transmission System Visualization for the Smart Grid

    Overbye, T. J.

    Proceedings of the 2009 IEEE/PES Power Systems Conference and Exposition (PSCE '09), Seattle, Washington, Mar. 15-18, 2009.1 [IEEE Xplore entry]

    Tags: 2009
  243. The Smart Grid and PMUs: Operational Challenges and Opportunities

    Overbye, T. J.; Weber, J. D.

    Proc. 2010 IEEE Power and Energy Society General Meeting, Minneapolis, Minnesota, July 25-29, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  244. Automated Derivation of Application-Aware Error Detectors using Static Analysis

    Pattabiraman, K.; Kalbarczyk, Z.; Iyer, R.

    Proceedings of the 13th IEEE International On-Line Testing Symposium (IOLTS), Heraklion, Crete, Greece, July 8-11, 2007, pp. 211-216.1 [IEEE Xplore entry]

    Tags: 2007
  245. Discovering Application-level Insider Attacks using Symbolic Execution

    Pattabiraman, K.; Nakka, N.; Kalbarczyk, Z.; Iyer, R.

    Emerging Challenges for Security, Privacy and Trust: Proceedings of the 24th IFIP TC 11 International Information Security Conference (SEC), Pafos, Cyprus, May 18-20, 2009, IFIP Advances in Information and Communication Technology, vol. 297, Springer, pp. 63-75. [SpringerLink entry]

    Tags: 2009
  246. Dynamic Derivation of Application-Specific Error Detectors and their Implementation in Hardware

    Pattabiraman, K.; Saggese, G. P.; Chen, D.; Kalbarczyk, Z.; Iyer, R.

    Proc. of European Dependable Computing Conference, EDCC-6, Oct. 18-20, 2006, pp. 97-108.1 [IEEE Xplore entry]

    Tags: 2006
  247. A One-Phase Distribution Level Phasor Measurement Unit for Post-Event Analysis

    Pinte, B., Quinlan, M., Yoon, A., Reinhard, K., and Sauer, P.

    to appear in Power and Energy Conference at Illinois (PECI) 2014.

    Tags: 2014
  248. Detecting Kernel Rootkits

    Ramaswamy, A.

    Master's Thesis published as Dartmouth Computer Science Technical Report TR2008-627, September 2008. [Dartmouth entry]

    Tags: 2008, Master's Thesis
  249. Katana: A Hot Patching Framework for ELF Executables

    Ramaswamy, A.; Bratus, S.; Smith, S. W.; Locasto, M.

    Proceedings of the 4th International Workshop on Secure Software Engineering (SecSE 2010). Co-published in the International Conference on Availability, Reliability and Security. February 2010, pp. 507–512.1 [IEEE Xplore entry]

    Tags: 2010
  250. The Utilization of Power Converters in Consumer Products for Distributed Reactive Power Support

    Recio, C.

    Master’s Thesis, University of Illinois at Urbana-Champaign, 2012.

    Tags: 2012, Master's Thesis
  251. Nonintrusive Load Monitoring for Verification and Diagnostics

    Reeg, C.

    Master's Thesis, Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, May 2011. [IDEALS entry]

    Tags: 2011, Master's Thesis
  252. Algorithm Development for Non-Intrusive Load Monitoring for Verification and Diagnostics

    Reeg, C.; Overbye, T. J.

    Proc. North American Power Symposium, Arlington, Texas, Sept. 26-28, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  253. Autoscopy Jr.: Intrusion Detection for Embedded Control Systems

    Reeves, J.

    Master's Thesis. Dartmouth College Computer Science Technical Report TR2011-704, August 2011. [Dartmouth entry]

    Tags: 2011, Master's Thesis
  254. Intrusion Detection for Resource-Constrained Embedded Control Systems in the Power Grid

    Reeves, J., Ramaswamy, A., Locasto, M., Bratus, S., Smith, S.W.

    International Journal of Critical Infrastructure Protection, vol. 5, no. 2, pp. 74-83, July, 2012. [SciVerse entry]

    Tags: 2012
  255. Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems

    Reeves, J.; Ramaswamy, A.; Locasto, M.; Bratus, S.; Smith, S.W.

    In Proceedings of IFIP Working Group 11.10 Conference on Critical Infrastructure Protection V, March 23-25, 2011, Hanover, NH, Volume 367/2011, pp. 31-46. [SpringerLink entry]

    Tags: 2011
  256. Control of Distributed Energy Resources for Reactive Power Support

    Robbins, B.A.; Domínguez-Garcia, A. D.; Hadjicostis, C.N.

    2011 North American Power Symposium (NAPS), pp.1-5, 4-6 Aug. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  257. An Authenticated Control Framework for Distributed Voltage Support on the Smart Grid

    Rogers, K. M.; Klump, R.; Khurana, H.; Aquino-Lugo, A. A.; Overbye, T. J.

    IEEE Transactions on Smart Grid, vol. 1, no. 1, June 2010, pp. 40-47.1 [IEEE Xplore entry]

    Tags: 2010
  258. Smart-Grid-Enabled Load and Distributed Generation as a Reactive Resource

    Rogers, K. M.; Klump, R.; Khurana, H.; Overbye, T. J.

    Proceedings of the IEEE Innovative Smart Grid Technologies Conference, Gaithersburg, Maryland, Jan. 19-21, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  259. Some Applications of Distributed Flexible AC Transmission System (D-FACTS) Devices in Power Systems

    Rogers, K. M.; Overbye, T. J.

    Proceedings of the 40th North American Power Symposium, Calgary, Canada, September 28-30, 2008.1 [IEEE Xplore entry]

    Tags: 2008
  260. Data-enhanced applications for power systems analysis

    Rogers, K.M.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, December 2011. [IDEALS entry]

    Tags: 2011, Ph.D. Dissertation
  261. Toward a Resilient Smart Grid

    Sanders, W.

    ieRoadmap News, quarter 1, 2010, p. 2. [link to online journal issue]

    Tags: 2010
  262. Progress Towards a Resilient Power Grid Infrastructure

    Sanders, W. H.

    Proceedings of the IEEE Power and Energy Society General Meeting (PES GM), Minneapolis, Minnesota, July 25-29, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  263. Building Resilient Infrastructures for Smart Energy Systems (Abstract)

    Sanders, W.H.

    in Proceedings of the 3rd IEEE PES Conference on Innovative Smart Grid Technologies (ISGT 2012), Washington, D.C., Jan. 16-20, 2012.1 [IEEE Xplore entry]

    Tags: 2012
  264. TCIPG: Trustworthy Cyber Infrastructure for the Power Grid Overview

    Sanders, W.H.

    in Proceedings of the 3rd IEEE PES Conference on Innovative Smart Grid Technologies (ISGT 2012), Washington, D.C., Jan. 16-20, 2012.1 [IEEE Xplore entry]

    Tags: 2012
  265. Analysis of a Key Management Scheme for Wireless Mesh Networks

    Sathyam, R.

    Master's Thesis, University of Illinois at Urbana-Champaign, 2008.

    Tags: 2008, Master's Thesis
  266. New models for networked control in Smart Grid

    Scaglione, A.; Wang, Z.; Alizadeh, M.

    Smart Grid Communications and Networking, edited by E. Hossain, Z. Han, H.V. Poor, Cambridge University Press, 2012. [Cambridge Catalogue entry]

    Tags: 2012
  267. Performance Analysis of Real Traffic Carried with Encrypted Cover Flows

    Schear, N.; Nicol, D. M.

    Proceedings of the 22nd Workshop on Principles of Advanced and Distributed Simulation, Rome, Italy, June 3-6, 2008, pp. 80-87.2 [ACM Digital Library entry]

    Tags: 2008
  268. The Power of the Wind: Facilitator's Guide

    Sebestik, J.

    National 4-H Curriculum Product Number 08384, 2008. [4-H Online entry]

    Tags: 2008
  269. The Power of the Wind: Youth Guide

    Sebestik, J.

    National 4-H Curriculum Product Number 08383, 2008. [4-H Online entry]

    Tags: 2008
  270. An Interactive K-12 Engineering Curriculum on Renewable Sources and Energy Storage in Power Systems

    Sebestik, J., Zhu, Q.

    In Proceedings of the 2012 Annual Conference of the American Society of Engineering Education (ASEE), San Antonio, June 10-13, 2012. [ASEE entry]

    Tags: 2012
  271. VMDedup: Memory De-duplication in Hypervisor

    Shaikh, F., Yao, F., Gupta I., Campbell, R.

    to appear in IEEE International Workshop on Cloud Analytics, Boston, MA, 2014.

    Tags: 2014
  272. Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing

    Shapiro, R.; Bratus, S.; Rogers, E.; Smith, S.W.

    In Proceedings of IFIP Working Group 11.10 Conference on Critical Infrastructure Protection V, March 23-25, 2011, Hanover, NH, Volume 367/2011, pp. 57-72. [SpringerLink entry]

    Tags: 2011
  273. Analysis of Security Data from a Large Computing Organization

    Sharma, A.; Kalbarczyk, Z.; Barlow, J.; Iyer, R.

    NCSA-CSL Technical Report-2010-02-15, University of Illinois at Urbana-Champaign, 2010.

    Tags: 2010
  274. Analysis of Credential Stealing Attacks in an Open Networked Environment

    Sharma, A.; Kalbarczyk, Z.; Iyer, R.; Barlow, J.

    Proceedings of the 4th International Conference on Network and System Security, NSS 2010, Melbourne, Australia, September 1-3, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  275. The Diversity of TPMs and its Effects on Development: A Case Study of Integrating the TPM into OpenSolaris

    Shubina, A.; Bratus, S.; Ingersol, W.; Smith, S.W.

     In Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing (STC '10). ACM, New York, NY, USA, 85-90.2 [ACM DL entry]

    Tags: 2010
  276. Preventative Directions for Insider Threat Mitigation via Access Control

    Sinclair, S.; Smith, S. W.

    Insider Attack and Cyber Security: Beyond the Hacker (S. J. Stolfo, S. M. Bellovin, S. Hershkop, A. D. Keromytis, Sinclair, S.; Smith, S. W.; Eds.), Advances in Information Security, vol. 39, pp. 165-194, Springer, 2008. [SpringerLink entry]

    Tags: 2008
  277. Automatic Verification of Security Policy Implementations

    Singh, S.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, May 2012.

    Tags: 2012, Ph.D. Dissertation
  278. Securing Current and Future Process Control Systems

    Singh, S.; Cunningham, R. K.; Cheung, S.; Fong, M.; Lindqvist, U.; Nicol, D. M.; Pawlowski, R.; Robinson, E.; Sanders, W. H.; Valdes, A.; Woodworth, B.; Zhivich, M.

    Proceedings of the IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, NH, March, 2007, vol. 253/2007, pp. 99-115. [SpringerLink entry]

    Tags: 2007
  279. Automatic Verification of Distributed and Layered Security Policy Implementations

    Singh, S.; Sanders, W. H.; Nicol, D. M.; Seri, M.

    University of Illinois at Urbana-Champaign Coordinated Science Laboratory Technical Report UILU-ENG-08-2209 (CRHC-08-05), July 2008.

    Tags: 2008
  280. Key Management for Secure Power SCADA

    Sleeper, M. K.

    Senior Honors Thesis, Dartmouth Computer Science Technical Report TR2008-628, June 2008. [Dartmouth entry]

    Tags: 2008, Senior Honors Thesis
  281. Cryptographic Scalability Challenges in the Smart Grid

    Smith, S.W.

    In Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies, Washington, DC, Jan 16-20, 2012.1 [IEEE Xplore entry]

    Tags: 2012
  282. Room at the Bottom: Authenticated Encryption on Slow Legacy Networks

    Smith, S.W.

    IEEE Security & Privacy, vol.9, no.4, pp.60-63, July-Aug. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  283. High Security with Low Latency in Legacy SCADA

    Solomakhin, R.; Tsang, P.; Smith, S. W.

    In Proceedings of 4th Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection IV, March 2010, vol. 342/2010, pp. 63-79. [SpringerLink entry]

    Tags: 2010
  284. Achieving Over-the-wire Configurable Confidentiality, Integrity, Authentication and Availability in GridStat's Status Dissemination

    Solum, E.

    Master's Thesis, Washington State University, December, 2007.

    Tags: 2007, Master's Thesis
  285. Modular Over-The-Wire Security in Managed Publish-Subscribe Systems

    Solum, E.; Hauser, C.; Bakken, D. E.

    Washington State University School of EECS Technical Report, EECS-GS-010, 2007.

    Tags: 2007
  286. Modular Over-the-Wire Configurable Security for Long-Lived Critical Infrastructure Monitoring Systems

    Solum, E.; Hauser, C.; Bakken, D.; Chakravarthy, R.

    Proceedings of the 3rd ACM International Conference on Distributed Event-based Systems, Nashville, Tennessee, July 6-9, 2009.2 [ACM Digital Library entry]

    Tags: 2009
  287. A Security Assessment of Trusted Platform Modules

    Sparks, E.

    Senior Honors Thesis, Dartmouth College, March 2007. Dartmouth College Department of Computer Science Technical Report TR 2007-597, 2007. [Dartmouth entry]

    Tags: 2007, Senior Honors Thesis
  288. IEEE 802.15.4 Wireless Security: Self-Assessment Frameworks

    Speers, R.M.

    Senior Honors Thesis, Dartmouth College, March 2007. Dartmouth College Department of Computer Science Technical Report TR2011-687, January 2011. [Dartmouth entry]

    Tags: 2011, Senior Honors Thesis
  289. Modeling Cyber-Physical Vulnerability of the Smart Grid with Incomplete Information

    Srivastava, A., Morris, T., Ernster, T., Vellaithurai, C., Pan, S., Adhikari, U

    IEEE Transactions on Smart Grid.1 [IEEE entry]

    Tags: 2013
  290. Context-sensitive Key Management For Smart Grid Telemetric Devices

    Tabassum, R.

    M.S. Thesis, Department of Computer Science, University of Illinois at Urbana-Champaign, 2013.

    Tags: 2013, Master's Thesis
  291. SCAPACH: Scalable Password-Changing Protocol for Smart Grid Device Authentication

    Tabassum, R., Nahrstedt, K., Rogers, E., Lui, K.

    to appear in Proceedings of International Conference on Computer Communication and Networks (ICCCN), 2013.

    Tags: 2013
  292. Extracting Steady State Values from Phasor Measurement Unit Data Using FIR and Median Filters

    Tate, J. E.; Overbye, T. J.

    Proceedings of the 2009 IEEE/PES Power Systems Conference and Exposition (PSCE '09), Seattle, Washington, Mar. 15-18, 2009.1 [IEEE Xplore entry]

    Tags: 2009
  293. Interactive Lessons for Pre-University Power Education

    Tate, J. E.; Overbye, T. J.; Sebestik, J.; Reese, G. C.

    IEEE Transactions on Power Systems, vol. 23, no. 3, pp. 824-830, August 2008.1 [IEEE Xplore entry]

    Tags: 2008
  294. Interactive Lessons Addressing Wind Integration and Time-of-Use Pricing

    Tate, J.E.; Sebestik, J.

    2011 IEEE Power and Energy Society General Meeting, pp.1-4, 24-29 July 2011.1 [IEEE Xplore entry]

    Tags: 2011
  295. Security of Smart Distribution Grids: Data Integrity Attacks on Integrated Volt/VAR Control and Countermeasures

    Teixeira, A., Dan, G., Sandberg, H., Berthier, R., Bobba, R., Valdes, A.

    to appear in proceedings of American Control Conference 2014.

    Tags: 2014
  296. Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers

    Tsang, P. P.; Smith, S. W.

    Proceedings of the 4th Information Security Practice and Experience Conference (ISPEC 2008), Lecture Notes in Computer Science (LNCS) vol. 4991, pp. 188-202, Sydney, Australia, April 21-23, 2008, Springer, 2008. [SpringerLink entry]

    Tags: 2008
  297. PPAA: Peer-to-Peer Anonymous Authentication

    Tsang, P. P.; Smith, S. W.

    Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS 2008), Lecture Notes in Computer Science (LNCS) vol. 5037, pp. 55-74, New York, NY, USA, June 3-6, 2008, Springer, 2008. [SpringerLink entry]

    Tags: 2008
  298. Secure Cryptographic Precomputation with Insecure Memory

    Tsang, P. P.; Smith, S. W.

    Proceedings of the 4th Information Security Practice and Experience Conference (ISPEC 2008), Lecture Notes in Computer Science (LNCS) vol. 4991, pp. 146-160, Sydney, Australia, April 21-23, 2008, Springer, 2008. [SpringerLink entry]

    Tags: 2008
  299. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)

    Tsang, P. P.; Smith, S. W.

    Dartmouth Computer Science Technical Report TR2008-617, April 2008. [Dartmouth entry]

    Tags: 2008
  300. BLAC: Revoking Repeatedly Misbehaving Anonymous Users Without Relying on TTPs

    Tsang, P.; Au, M. H.; Kapadia, A.; Smith, S. W.

    Dartmouth Computer Science Technical Report TR2008-635, October 2008. [Dartmouth entry]

    Tags: 2008
  301. Blacklistable Anonymous Credentials: Blocking Misbehaving Users Without TTPs

    Tsang, P.; Au, M. H.; Kapadia, A.; Smith, S. W.

    Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS '07), Alexandria, Virginia, USA, October 28-31, 2007, pp. 72-81.2 [ACM Digital Library entry]

    Tags: 2007
  302. Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs (Extended Version)

    Tsang, P.; Au, M. H.; Kapadia, A.; Smith, S. W.

    Dartmouth Computer Science Technical Report TR2007-601, September 2007. [Dartmouth entry]

    Tags: 2007
  303. PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication

    Tsang, P.; Au, M. H.; Kapadia, A.; Smith, S. W.

    Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS '08), Alexandria, Virginia, USA, October 27-31, 2008, pp. 333-344.2 [ACM Digital Library entry]

    Tags: 2008
  304. Batch Pairing Delegation

    Tsang, P.; Chow, S. S. M.; Smith, S. W.

    Proceedings of the 2nd International Workshop on Security (IWSEC 2007), Lecture Notes in Computer Science (LNCS) vol. 4752, pp. 74-90, Nara, Japan, October 29-31, 2007, Springer, 2007. [SpringerLink entry]

    Tags: 2007
  305. Nymble: Blocking Misbehaving Users in Anonymizing Networks

    Tsang, P.; Kapadia, A.; Cornelius, C.; Smith, S. W.

    Dartmouth Computer Science Technical Report TR2008-637, December 2008. [Dartmouth entry]

    Tags: 2008
  306. Anonymous IP-Address Blocking in Tor with Trusted Computing (Work in Progress)

    Tsang, P.; Kapadia, A.; Smith, S. W.

    Proceedings of the Second Workshop on Advances in Trusted Computing: WATC '06 Fall (online), 2006. [online proceedings]

    Tags: 2006
  307. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    Tsang, P.; Smith, S. W.

    Proceedings of the IFIP TC 11 23rd International Information Security Conference (SEC 2008), Milano, Italy, 2008, pp. 445-460. [SpringerLink entry]

    Tags: 2008
  308. Authenticated Streamwise On-line Encryption

    Tsang, P.; Solomakhin, R. V.; Smith, S. W.

    Dartmouth Computer Science Technical Report TR2009-640, March 2009. [Dartmouth entry]

    Tags: 2009
  309. Asynchronous Hardware-Enforced Memory Safety

    Tseng, K-Y.

    M.S. Thesis, Department of Computer Science, University of Illinois at Urbana-Champaign, August 2013.

    Tags: 2013, Master's Thesis
  310. Characterization of Error Resiliency of Power Grid Substation Devices

    Tseng, K., Chen, D., Kalbarczyk, Z., Iyer, R.K.

    In Proceedings of the 2012 IEEE International Conference on Dependeable Systems and Networks (DSN 2012), Boston, MA, June 25-28, 2012.1  [IEEE Xplore entry]

    Tags: 2012
  311. Cyber-Power System Analysis Using a Real Time Test Bed

    Vellaithurai, C.

    Ph.D. Dissertation, Washington State University, July 2013.

    Tags: 2013, Ph.D. Dissertation
  312. SECPSIM: A Training Simulator for Cyber-Power Infrastructure Security

    Vellaithurai, C., Srivastava, A., Zonouz, S.

    to appear in proceedings of SmartGridComm, Vancouver, Canada, October 2013.

    Tags: 2013
  313. Ratatoskr: Wide-area Actuator RPC over GridStat with Timeliness, Redundancy, and Safety

    Viddal, E. S.

    Master's Thesis, Washington State University, 2007.

    Tags: 2007, Master's Thesis
  314. Ratatoskr: Wide-Area Actuator RPC over GridStat with Timeliness, Redundancy, and Safety

    Viddal, E.; Abelsen, S.; Bakken, D.; Hauser, C.

    Washington State University School of EECS Technical Report, EECS-GS-011, 2007.

    Tags: 2007
  315. Confidentiality-preserving Obfuscation for Cloud-based Power System Contingency Analysis

    Vukovic, O., Dan, G., Bobba, R. B.

    to appear in proceedings of IEEE SmartGridComm 2013.

    Tags: 2013
  316. Real-time prices in an entropic grid

    Wang, G., Negrete-Pincetic, M., Kowli, A., Shafieepoorfard, E., Meyn, S., Shanbhag, U.

    In Proceedings of the 2012 IEEE PES Conference on Innovative Smart Grid Technologies (ISGT), pp. 1-8, 16-20 Jan. 2012.1 [IEEE Xplore entry]

    Tags: 2012
  317. A Control Theorist's Perspective on Dynamic Competitive Equilibria in Electricity Markets

    Wang, G.; Kowli, A,; Negrete-Pincetic, M.; Shafieepoorfard, E.; Meyn, S.

    Proceedings of the 18th World Congress of the International Federation of Automatic Control (IFAC 2011), Milano, Italy, Vol. 18, no. 1, August 2011.3 [IFAC-PapersOnLine entry]

    Tags: 2011
  318. Dynamic Competitive Equilibria in Electricity Markets

    Wang, G.; Negrete-Pincetic, M.; Kowli, A.; Shafieepoorfard, E.; Meyn, S.; Shanbhag, U.

    Control and Optimization Methods for Electric Smart Grids, 2012, vol. 3, no. 1, pp. 35-62. [SpringerLink entry]

    Tags: 2012
  319. An OS-level Framework for Providing Application-AwareReliability

    Wang, L.; Kalbarczyk, Z.; Gu, W.; Iyer, R.

    Proceedings of the Pacific Rim International Symposium on Dependable Computing, PRDC'06, 2006, pp. 55-62.1 [IEEE Xplore entry]

    Tags: 2006
  320. Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

    Wang, Q.; Khurana, H.; Huang, Y.; Nahrstedt, K.

    Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 19-25, 2009, pp. 1233-1241.1 [IEEE Xplore entry]

    Tags: 2009
  321. MIS: Malicious Nodes Identification Scheme in Network-coding-based Peer-to-Peer Streaming

    Wang, Q.; Vu, L.; Nahrstedt, K.; Khurana, H.

    Proc. IEEE Conference on Computer Communications Workshops, INFOCOM, San Diego, CA, USA, March 15-19, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  322. A Trust Modeling Framework with Application to Critical Infrastructures

    Wang, Y., Gamage, T., Hauser, C.

    to appear in proceedings of the 2014 Cyber Security Symposium, April 8, 2014, Moscow, ID.

    Tags: 2014
  323. An Evidence-Based Bayesian Trust Assessment Framework for Critical Infrastructure Decision Making

    Wang, Y.; Hauser, C.

    In Proceedings of IFIP Working Group 11.10 Conference on Critical Infrastructure Protection V, March 23-25, 2011, Hanover, NH, Volume 367/2011, pp. 125-135. [SpringerLink entry]

    Tags: 2011
  324. Networked Loads in the Distribution Grid

    Wang, Z., Li, X., Muthukumar, V., Scaglione, A., Peisert, S., McParland, C.

    in Proceedings of APSIPA ASC 2012, December 2012.1 [IEEE Xplore entry]

    Tags: 2012
  325. Electrical Centrality Measures for Power Grids

    Wang, Z., Scaglione, A., Thomas, R.J.

    Control and Optimizaiton Methods for Electric Smart Grids, 2012, vol. 3, no. 2, pp. 239-255. [SpringerLink entry]

    Tags: 2012
  326. Compressing Electrical Power Grids

    Wang, Z.; Scaglione, A.; Thomas, R. J.

    Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, Maryland, Oct. 4-6, 2010, pp. 13-18.1 [IEEE Xplore entry]

    Tags: 2010
  327. Electrical Centrality Measures for Electric Power Grid Vulnerability Analysis

    Wang, Z.; Scaglione, A.; Thomas, R. J.

    Proceedings of the 49th IEEE Conference on Decision and Control, Atlanta, Georgia, December 15-17, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  328. Generating Statistically Correct Random Topologies for Testing Smart Grid Communication and Control Networks

    Wang, Z.; Scaglione, A.; Thomas, R. J.

    IEEE Transactions on Smart Grid, vol. 1, no. 1, June 2010, pp. 28-39.1 [IEEE Xplore entry]

    Tags: 2010
  329. On Modeling Random Topology Power Grids for Testing Decentralized Network Control Strategies

    Wang, Z.; Scaglione, A.; Thomas, R. J.

    Proceedings of the 1st IFAC Workshop on Estimation and Control of Networked Systems, Venice, Italy, Sept. 24-26, 2009, pp. 114-119.3 [IFAC-PapersOnLine entry]

    Tags: 2009
  330. The Node Degree Distribution in Power Grid and Its Topology Robustness under Random and Selective Node Removals

    Wang, Z.; Scaglione, A.; Thomas, R. J.

    1st IEEE International Workshop on Smart Grid Communications, Cape Town, South Africa, May 2010.1 [IEEE Xplore entry]

    Tags: 2010
  331. A Markov-Transition Model for Cascading Failures in Power Grids

    Wang, Z.; Scaglione, A.; Thomas, R.J.

    In Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS), January 2012.1 [IEEE CS entry]

    Tags: 2012
  332. Generating Random Topology Power Grids

    Wang, Z.; Thomas, R. J.; Scaglione, A.

    Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), Waikola, Big Island, Hawaii, January 7-10, 2008.1 [IEEE Xplore entry]

    Tags: 2008
  333. Grid Cryptographic Simulation: A Simulator to Evaluate the Scalability of the X.509 Standard in the Smart Grid

    Ward, T.

    Senior Honors Thesis, Dartmouth Computer Science Technical Report TR2013-742, September 2013.

    Tags: 2013, Senior Honors Thesis
  334. Security-Policy Analysis with eXtended Unix Tools

    Weaver, G.

    Ph.D. Dissertation. Dartmouth College Department of Computer Science Technical Report TR2013-728, 2013. [Dartmouth entry]

    Tags: 2013, Ph.D. Dissertation
  335. XUTools: UNIX Commands for Processing Next-Generation Structured Text

    Weaver, G., Smith, S.W.

    To appear in Proceedings of USENIX LISA 2012, San Diego, CA, December 2012. 

    Tags: 2012
  336. Re-engineering Grep and Diff for NERC CIP

    Weaver, G., Smith, S.W., Bobba, R., Rogers, E.

    In proceedings of the 2012 IEEE Power and Energy Conference at Illinois (PECI), pp. 1-8, 24-25 Feb. 2012.1  [IEEE Xplore entry]

    Tags: 2012
  337. Context-Free Grep and Hierarchical Diff

    Weaver, G.; Smith, S.W.

    poster and abstract presented at the 25th Large Installation System Administration Conference (LISA '11), Boston, MA, December 4-9, 2011. [USENIX Conference Site

    Tags: 2011
  338. Toward a Cyber-Physical Topology Language: Applications to NERC CIP Audit

    Weaver, G.A., Cheh, C., Rogers, E. J., Sanders, W.H., and Gammel, D.

    to appear in proceedings of the Smart Energy Grid Security Workshop (SEGS), Berlin, Germany, Nov. 8, 2013.

    Tags: 2013
  339. Dependable Cyber-Physical Systems through Control Flow Monitoring

    Woude, J. V. d.

    Senior Thesis in Computer Engineering, University of Illinois at Urbana-Champaign, May 2013.

    Tags: 2013, Senior Honors Thesis
  340. Design of a two-level power system linear state estimator

    Yang, T.

    Ph.D. Dissertation, Washington State University, May 2011. [WSU entry]

    Tags: 2011
  341. Transition to a Two-Level Linear State Estimator, part I: Architecture

    Yang, T.; Sun, H.; Bose, A.

    IEEE Transactions on Power Systems, vol.26, no.1, pp.46-53, Feb. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  342. Transition to a Two-Level Linear State Estimator, part II: Algorithm

    Yang, T.; Sun, H.; Bose, A.

    IEEE Transactions on Power Systems, vol.26, no.1, pp.54-62, Feb. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  343. Two-level PMU-based Linear State Estimator

    Yang, T.; Sun, H.; Bose, A.

    Proceedings of the IEEE PES Power Systems Conference & Exposition (PSCE), Seattle, Washington, March 15-18, 2009.1 [IEEE Xplore entry]

    Tags: 2009
  344. CouchFS: A High-Performance File System for Large Data Sets

    Yao, F., Campbell, R.

    to appear in IEEE BigData 2014, Anchorage, AK.

    Tags: 2014
  345. Smart Grid Protocol Testing Through Cyber-Physical Testbeds

    Yardley, T., Berthier, R., Nicol, D.M., Sanders, W.H.

    Proceedings of the 4th IEEE PES Innovative Smart Grid Technologies (ISGT 2013) Conference, Washington, D.C., February 2013.1 [IEEE Xplore entry]

    Tags: 2013
  346. HTAF: Hybrid Testing Automation Framework to Leverage Local and Global Computing Resources

    Yim, K.S.; Hreczany, D.; Iyer, R.K.

    Proceedings of the International Conference on Computation Science and Its Applications (ICCSA 2011), LNCS vol. 6784, June 2011, pp. 479-494. [SpringerLink entry]

    Tags: 2011
  347. Hauberk: Lightweight Silent Data Corruption Error Detector for GPGPU

    Yim, K.S.; Phan, C.; Saleheen, M.; Kalbarczyk, Z.; Iyer, R.

    2011 IEEE International Parallel & Distributed Processing Symposium (IPDPS), pp.287-300, 16-20 May 2011.1 [IEEE Xplore entry]

    Tags: 2011
  348. SecureCore: A Multicore-based Intrusion Detection Architecture for Real-Time Embedded Systems

    Yoon, M. K., Mohan, S., Choi, J., Kim, J.E., Sha, L.

    in proceedings of the 19th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2013), pp. 21-31, Apr. 2013.[IEEE entry]

    Tags: 2013
  349. Formal Framework and Tools to Derive Efficient Application-level Detectors against Memory Corruption Attacks

    Yuan, F. Q.-Y.

    Master's Thesis, University of Illinois at Urbana-Champaign, May 2010. [IDEALS entry]

    Tags: 2010, Master's Thesis
  350. On the application of PMU measurements to system stability analysis

    Zhang, J.

    Master's Thesis, University of Illinois at Urbana-Champaign, 2012. [IDEALS entry]

    Tags: 2012, Master's Thesis
  351. On the Failure of Power System Automatic Generation Control due to Measurement Noise

    Zhang, J. and Dominguez-Garcia, A.

    to appear in IEEE Power and Energy Society General Meeting, National Harbor, MD, July 2014.

    Tags: 2014
  352. On the Application of Phasor Measurement Units to Power System Stability Monitoring and Analysis

    Zhang, J., Chen, D.

    In proceedings of the 2012 IEEE Power and Energy Conference at Illinois (PECI), pp. 1-6, 24-25 Feb. 2012.[IEEE Xplore entry]

    Tags: 2012
  353. Application-Aware Secure Multicast for Power Grid Communications

    Zhang, J.; Gunter, C. A.

    Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, Maryland, Oct. 4-6, 2010, pp. 339-344.1 [IEEE Xplore entry]

    Tags: 2010
  354. Online Assessment of Fault Current Considering Substation Topologies

    Zhang, Y.; Bose, A.

    Proceedings of the 2010 IEEE Power & Energy Society General Meeting, Minneapolis, Minnesota, July 25-29, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  355. Aggregated Path Authentication for Efficient BGP Security

    Zhao, M.; Smith, S.; Nicol, D.

    Proceedings of the 2005 ACM Conference on Computer and Communications Security (CCS 2005), Alexandria, VA, November 2005.2 [ACM Digital Library entry]

    Tags: 2005
  356. Large-Scale and High-Fidelity Wireless Network Simulation and Emulation

    Zheng, Y.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2013.

    Tags: 2013, Ph.D. Dissertation
  357. Validation of Application Behavior on a Virtual Time Integrated Network Emulation Testbed

    Zheng, Y., Jin, D., Nicol, D.

    in Proceedings of the Winter Simulation Conference (WSC 2012), December 2012.1 [IEEE Xplore entry]

    Tags: 2012
  358. A Virtual Time System for OpenVZ-Based Network Emulations

    Zheng, Y.; Nicol, D.

    2011 IEEE Workshop on Principles of Advanced and Distributed Simulation (PADS), pp.1-10, 14-17 June 2011.1 [IEEE Xplore entry]

    Tags: 2011
  359. Cost-aware Systemwide Intrusion Defense via Online Forensics and On-demand Detector Deployment

    Zonouz, S. A.; Joshi, K. R.; Sanders, W. H.

    Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), Chicago, Illinois, Oct. 4, 2010, pp. 71-74.2 [ACM Digital Library entry]

    Tags: 2010
  360. SOCCA: A Security-Oriented Cyber-physical Contingency Analysis in Power Infrastructures

    Zonouz, S., Davis, M., Davis, K., Berthier, R., Bobba, R.B., Sanders, W.

    to appear in IEEE Transactions on Smart Grid.1[IEEE Xplore entry]

    Tags: 2013
  361. SCPSE: Security-Oriented Cyber-Physical State Estimation for Power-Grid Critical Infrastructures

    Zonouz, S., Rogers, K.M., Berthier, R., Bobba, R.B., Sanders, W.H., Overbye, T.J.

    in IEEE Transactions on Smart Grid, vol. 3, no. 4, December 2012, pp. 1790-1799.1 [IEEE Xplore entry]

    Tags: 2012
  362. A Kalman-based Coordination for Hierarchical State Estimation: Algorithm and Analysis

    Zonouz, S., Sanders, W.H.

    Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), Waikola, Big Island, Hawaii, January 7-10, 2008.1 [IEEE Xplore entry]

    Tags: 2008
  363. FloGuard: Cost-Aware Systemwide Intrusion Defense via Online Forensics and On-Demand IDS Deployment

    Zonouz, S.; Joshi, K.; Sanders, W.H.

    Proceedings of the 30th International Conference on Computer Safety, Reliability, and Security (SafeComp 2011), Lecture Notes in Computer Science (LNCS), 2011, Vol. 6894/2011, pp. 338-354. [SpringerLink entry]

    Tags: 2011
  364. RRE: A Game-Theoretic Intrusion Response and Recovery Engine

    Zonouz, S.; Khurana, H.; Sanders, W.; Yardley, T.

    Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Estoril, Lisbon, Portugal, June 29-July 2, 2009, pp. 439-448.1 [IEEE Xplore entry]

    Tags: 2009
  365. Game-Theoretic Intrusion Response and Recovery

    Zonouz, S.A.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, June 2011. [IDEALS entry]

    Tags: 2011, Ph.D. Dissertation

COPYRIGHT NOTICE

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

1. The following copyright notice applies to all of the above items that appear in IEEE publications: "Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE."

2. The following copyright notice applies to all of the above items that appear in ACM publications: "© ACM, effective the year of publication shown in the bibliographic information. This file is the author’s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in the journal or proceedings indicated in the bibliographic data for each item."

3. The following copyright notice applies to all of the above items that appear in IFAC publications: "Document is being reproduced under permission of the Copyright Holder. Use or reproduction of the Document is for informational or personal use only."

Tags