Alvaro A. Cárdenas

According to our database1, Alvaro A. Cárdenas authored at least 98 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Impact of the Market Infrastructure on the Security of Smart Grids.
IEEE Trans. Industrial Informatics, 2019

Improving the Security of Visual Challenges.
TCPS, 2019

A business that can't lose: Investing in attacks against the Colombian power grid.
IJCIP, 2019

Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices.
IEEE Security & Privacy, 2019

Mitigating Sensor Attacks Against Industrial Control Systems.
IEEE Access, 2019

Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

IEC 60870-5-104 Network Characterization of a Large-Scale Operational Power Grid.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Privacy and Security in Internet-Connected Cameras.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

A new metric to compare anomaly detection algorithms in cyber-physical systems.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

A Moving Target Defense to Detect Stealthy Attacks in Cyber-Physical Systems.
Proceedings of the 2019 American Control Conference, 2019

Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
Proceedings of the Applied Cryptography and Network Security, 2019

Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detection.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
DDDAS for Attack Detection and Isolation of Control Systems.
Proceedings of the Handbook of Dynamic Data Driven Applications Systems., 2018

Quantifying the Utility-Privacy Tradeoff in the Internet of Things.
TCPS, 2018

Leveraging Software-Defined Networking for Incident Response in Industrial Control Systems.
IEEE Software, 2018

A Survey of Physics-Based Attack Detection in Cyber-Physical Systems.
ACM Comput. Surv., 2018

Temporal Phase Shifts in SCADA Networks.
CoRR, 2018

Virtual incident response functions in control systems.
Computer Networks, 2018

ALERT: Adding a Secure Layer in Decision Support for Advanced Driver Assistance System (ADAS).
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

Measuring the Growth in Complexity of Models from Industrial Control Networks.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

An Adaptive Real-Time Architecture for Zero-Day Threat Detection.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Cyber-Insurance for Cyber-Physical Systems.
Proceedings of the IEEE Conference on Control Technology and Applications, 2018

Temporal Phase Shifts in SCADA Networks.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

Constraining Attacker Capabilities Through Actuator Saturation.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
SDN and NFV Security: Challenges for Integrated Solutions.
Proceedings of the Guide to Security in SDN and NFV, 2017

Smart Grids.
IEEE Wireless Commun., 2017

Integrity Attacks on Real-Time Pricing in Smart Grids: Impact and Countermeasures.
IEEE Trans. Smart Grid, 2017

Guest Editors' Introduction: Cyber-Physical Systems Security and Privacy.
IEEE Design & Test, 2017

Security and Privacy in Cyber-Physical Systems: A Survey of Surveys.
IEEE Design & Test, 2017

Corrections.
IEEE Design & Test, 2017

Constraining Attacker Capabilities Through Actuator Saturation.
CoRR, 2017

Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

Optimal Security Investments in a Prevention and Detection Game.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

Security and privacy trade-offs in CPS by leveraging inherent differential privacy.
Proceedings of the IEEE Conference on Control Technology and Applications, 2017

Optimal risk management in critical infrastructures against cyber-adversaries.
Proceedings of the IEEE Conference on Control Technology and Applications, 2017

Sexual Intimacy in the Age of Smart Devices: Are We Practicing Safe IoT?
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

Remote Proofs of Video Freshness for Public Spaces.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

Understanding Security Threats in Consumer Drones Through the Lens of the Discovery Quadcopter Family.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

Security & Privacy in Smart Toys.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

A New Burst-DFA model for SCADA Anomaly Detection.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

Security analysis of control system anomaly detectors.
Proceedings of the 2017 American Control Conference, 2017

Security vs. privacy: How integrity attacks can be masked by the noise of differential privacy.
Proceedings of the 2017 American Control Conference, 2017

2016
Cyber-Physical Security and Privacy [Guest editors' introduction].
IEEE Internet Computing, 2016

Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Modeling Modbus TCP for intrusion detection.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Limiting the Impact of Stealthy Attacks on Industrial Control Systems.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A multi-layered and kill-chain based security analysis framework for cyber-physical systems.
IJCIP, 2015

How the quantity and quality of training data impacts re-identification of smart meter users?
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Detecting fraud in demand response programs.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Incentives for demand-response programs with nonlinear, piece-wise continuous electricity cost functions.
Proceedings of the American Control Conference, 2015

Using Visual Challenges to Verify the Integrity of Security Cameras.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures.
IEEE Trans. Smart Grid, 2014

Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks.
IJCIP, 2014

Control Systems for the Power Grid and Their Resiliency to Attacks.
IEEE Security & Privacy, 2014

Effects of Risk on Privacy Contracts for Demand-Side Management.
CoRR, 2014

Attenuating the Impact of Integrity Attacks on Real-Time Pricing in Smart Grids.
CoRR, 2014

Quantifying the Utility-Privacy Tradeoff in the Smart Grid.
CoRR, 2014

On the practicality of detecting anomalies with encrypted traffic in AMI.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Timing of Cyber-Physical Attacks on Process Control Systems.
Proceedings of the Critical Infrastructure Protection VIII, 2014

Is this a good time?: deciding when to launch attacks on process control systems.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

From CRCs to resilient control systems: differentiating between reliability and security for the protection of cyber-physical systems.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Cyber-Physical Systems Attestation.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

Privacy and customer segmentation in the smart grid.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

Delay and sampling independence of a consensus algorithm and its application to smart grid privacy.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

CPS: market analysis of attacks against demand response in the smart grid.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Depth-First Forwarding (DFF) in Unreliable Networks.
RFC, June, 2013

Big Data Analytics for Security.
IEEE Security & Privacy, 2013

Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Resilience of Process Control Systems to Cyber-Physical Attacks.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

Data Handling in the Smart Grid: Do We Know Enough?
Proceedings of the Critical Infrastructure Protection VII, 2013

Controllability of Dynamical Systems: Threat Models and Reactive Security.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

2012
AMI threats, intrusion detection requirements and deployment recommendations.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Evaluating Electricity Theft Detectors in Smart Grid Networks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Comparison of data forwarding mechanisms for AMI networks.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

Fifth ACM workshop on artificial intelligence and security (AISec 2012).
Proceedings of the ACM Conference on Computer and Communications Security, 2012

A game theory model for electricity theft detection and privacy-aware control in AMI systems.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Attacks against process control systems: risk assessment, detection, and response.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Nudge: Intermediaries' Role in Interdependent Network Security.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Semantic middleware for the Internet of Things.
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010

2009
Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments.
IEEE/ACM Trans. Netw., 2009

Understanding the physical and economic consequences of attacks on control systems.
IJCIP, 2009

Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems.
Ad Hoc Networks, 2009

Safe and Secure Networked Control Systems under Denial-of-Service Attacks.
Proceedings of the Hybrid Systems: Computation and Control, 12th International Conference, 2009

2008
Research Challenges for the Security of Control Systems.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Secure Control: Towards Survivable Cyber-Physical Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Principled reasoning and practical applications of alert fusion in intrusion detection systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers.
Journal of Computer Security, 2007

Optimal ROC Curve for a Combination of Classifiers.
Proceedings of the Advances in Neural Information Processing Systems 20, 2007

Performance Comparison of Detection Schemes for MAC Layer Misbehavior.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

On Optimal Watermarking Schemes in Uncertain Gaussian Channels.
Proceedings of the International Conference on Image Processing, 2007

Towards Optimal Design of Data Hiding Algorithms Against Nonparametric Adversary Models.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

2006
A Framework for the Evaluation of Intrusion Detection Systems.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Towards a secure and interoperable DRM architecture.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

B-ROC Curves for the Assessment of Classifiers over Imbalanced Data Sets.
Proceedings of the Proceedings, 2006

2004
Detection and prevention of MAC layer misbehavior in ad hoc networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004


  Loading...