selected publications
-
academic article
- Adaptive IDS for Cooperative Intelligent Transportation Systems Using Deep Belief Networks. Algorithms. 15. 2022
- IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method. Applied Sciences - Basel. 12. 2022
- Novel Security Models for IoT-Fog-Cloud Architectures in a Real-World Environment. Applied Sciences - Basel. 12. 2022
- A Formal Model and Verification for HESTIA: An Automated, Adversary-Aware Risk Assessment Process for Cyber Infrastructure. IEEE Access. 10:83755-83792. 2022
- Examining the Performance of Fog-Aided, Cloud-Centered IoT in a Real-World Environment. Sensors. 21. 2021
- Detecting Stealthy False Data Injection Attacks in the Smart Grid Using Ensemble-Based Machine Learning. Computers and Security. 97:101994. 2020
- Access Control in Fog Computing: Challenges and Research Agenda. IEEE Access. 8:83986-83999. 2020
- A data integrity verification scheme in mobile cloud computing. Journal of Network and Computer Applications. 77:146-151. 2017
- Model-based autonomic security management for cyber-physical infrastructures. International Journal of Critical Infrastructures. 12:273-294. 2016
- Defining and computing a value based cyber-security measure. Information Systems and E-business Management. 10:433-453. 2012
- The Insecurity of Wireless Networks. IEEE Security and Privacy. 10:54-61. 2012
- Forewarning of Failure in Complex System. Journal of Homeland Security. 5:1-16. 2011
- Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor. IEEE Security and Privacy. 9:14-23. 2011
- Quantifying security threats and their potential impacts: a case study. Innovations in Systems and Software Engineering. 6:269-281. 2010
- Moving Toward Trustworthy Systems: R&D Essentials. Computer. 43:31-40. 2010
- Authentication Protocol Using Quantum Superposition States. International Journal of Network Security. 9:101-108. 2009
- Modeling security as a dependability attribute: a refinement-based approach. Innovations in Systems and Software Engineering. 2:39-48. 2006
- A short survey on quantum computers. International Journal of Computers and Applications. 28:227-233. 2006
- Measuring the complexity of class diagrams in reverse engineering. Journal of Software Maintenance and Evolution-research and Practice. 18:333-350. 2006
- Recovery preservation: a measure of last resort. Innovations in Systems and Software Engineering. 1:54-62. 2005
- Testing software requirements with Z and statecharts applied to an embedded control system. Software Quality Journal. 12:231-264. 2004
- Critical Energy Infrastructure Survivability, Inherent Limitations, Obstacles and Mitigation Strategies. International Journal of Power and Energy Systems. 86-92. 2004
- Multi-Agent System Case Studies in Command and Control, Information Fusion and Data Management. Informatica. 28:79-89. 2004
- Metrics for maintainability of class inheritance hierarchies. Journal of Software Maintenance and Evolution-research and Practice. 14:147-160. 2002
- A Review of Some Rigorous Software Design and Analysis Tools. Software Focus. 2:140-150. 2001
- Composing, analyzing and validating software models to assess the performability of competing design candidates. Annals of Software Engineering. 8:239-287. 1999
- Specification and analysis of real-time systems using csp and petri nets. International Journal of Software Engineering and Knowledge Engineering. 6:229-248. 1996
- Reliability Measurement: From Theory To Practice. IEEE Software. 9:13-20. 1992
-
article
- Development of the Joint Weigh-In- Motion (WIM) and Measurement Reach Back Capability (WIM-RBC): The Configuration and Data Management Tool. SOLE Logistics Spectrum Magazine. 38:4-9. 2005
-
chapter
- Data Diodes in Support of Trustworthy Cyber Infrastructure and Net-Centric Cyber Decision Support. Optimization and Security Challenges in Smart Power Grids. Springer. 203-216. 2013
- Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment. ISSE 2013 Securing Electronic Business Processes. Ed. Reimer, Helmut. Springer. 133-147. 2013
-
conference paper
- Attack Scenario-based Validation of the Idaho CPS Smart Grid Cybersecurity Testbed (ISAAC). 2019 IEEE Texas Power and Energy Conference (TPEC). 2019
- Formalizing an Automated, Adversary-aware Risk Assessment Process for Critical Infrastructure. 2019 IEEE Texas Power and Energy Conference (TPEC). 2019
- ISAAC: The Idaho CPS Smart Grid Cybersecurity Testbed. 2019 IEEE Texas Power and Energy Conference (TPEC). 2019
- METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security. 2018 13th International Conference on Malicious and Unwanted Software (MALWARE). 2019
- A virtual testbed for security management of industrial control systems. International Conference on Malicious and Unwanted Software (MALWARE). 2018
- Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure. Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop. 2013
- Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA). Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop. 2013
- Intrinsically resilient energy control systems. Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop. 2013
- Anomaly detection in multiple scale for insider threat analysis. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research. 2011
- Has the cyber warfare threat been overstated?: a cheap talk game-theoretic analysis on the Google-hacking claim?. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research. 2011
- Secure VM for monitoring industrial process controllers. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research. 2011
- Secure cryptographic key management system (CKMS) considerations for smart grid devices. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research. 2011
-
editorial article
- Introduction to the special issue on cyber security and management. Information Systems and E-business Management. 10:429-431. 2012