Zobrazeno 1 - 10
of 259
pro vyhledávání: '"David M. Nicol"'
Autor:
Ertem Esiner, Utku Tefek, Hasan S. M. Erol, Daisuke Mashima, Binbin Chen, Yih-Chun Hu, Zbigniew Kalbarczyk, David M. Nicol
Publikováno v:
IEEE Transactions on Smart Grid. 13:3214-3226
Publikováno v:
2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm).
Autor:
David M. Nicol
Publikováno v:
2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm).
Publikováno v:
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
Autor:
David M. Nicol
Publikováno v:
IEEE Security & Privacy. 19:24-32
Ransomware attacks on energy systems are on the rise. We consider ransomware attacks within an IT system's operational technology side, reference some known ransomware incidents, consider attack vectors, and comment on the work still to be done.
Autor:
Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, Marco A. Gamarra, Oscar R. Gonzalez, David M. Nicol
Publikováno v:
Modeling and Design of Secure Internet of Things. :273-294
In this chapter, we present a model that characterizes the propagation of stepping‐stone attacks in the Internet of Things (IoT) using a vulnerability graph with fixed and switching topology. The cost of a stepping‐stone stack path is modeled as
Autor:
Kartik Palani, David M. Nicol
Publikováno v:
ACM SIGMETRICS Performance Evaluation Review. 47:4-7
Given a choice among multiple security monitoring solutions and multiple locations to deploy them,what strategy best protects the network? What metric is used to compare different securing strategies? What constraints make it harder/easier to secure
Autor:
Yu Zhang, Tarek Abdelzaher, Yifan Hao, Shengzhong Liu, David M. Nicol, Hoang Hai Nguyen, Dongxin Liu, Andong Jing, Jiawei Han, Tianshi Wang, Sam Cohen, Huajie Shao, Gyorgy Korniss, James Flamino, Shuochao Yao, Omar Malik, Stephen Dipple, Fred Buchanan, Boleslaw K. Szymanski
Publikováno v:
Computational and Mathematical Organization Theory. 26:145-174
This paper describes the design, implementation, and early experiences with a novel agent-based simulator of online media streams, developed under DARPA’s SocialSim Program to extract and predict trends in information dissemination on online media.
Autor:
David M. Nicol
Publikováno v:
IEEE Security & Privacy. 18:4-7
Publikováno v:
CPSIOTSEC@CCS
Bump-in-the-wire (bump) devices can be used to protect critical endpoints in Industrial Control System (ICS) networks. However, bump devices cannot be used to authenticate incoming broadcast traffic, are complex to manage, and one bump is needed per