Alvaro A. Cárdenas

According to our database1, Alvaro A. Cárdenas authored at least 108 papers between 2004 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Guest Editorial: Special Section on Security and Privacy in Industry 4.0.
IEEE Trans. Ind. Informatics, 2020

Introduction to the Special Issue on User-Centric Security and Safety for CPS.
ACM Trans. Cyber Phys. Syst., 2020

SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants.
Proceedings of the 29th USENIX Security Symposium, 2020

Real-Time Attack-Recovery for Cyber-Physical Systems Using Linear Approximations.
Proceedings of the 41st IEEE Real-Time Systems Symposium, 2020

Adversarial Classification Under Differential Privacy.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Uncharted Networks: A First Measurement Study of the Bulk Power System.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

The more the merrier: adding hidden measurements to secure industrial control systems.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

DARIA: Designing Actuators to Resist Arbitrary Attacks Against Cyber-Physical Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Dynamic Sensor Processing for Securing Unmanned Vehicles.
Proceedings of the Dynamic Data Driven Applications Systems, 2020

2019
Impact of the Market Infrastructure on the Security of Smart Grids.
IEEE Trans. Ind. Informatics, 2019

Improving the Security of Visual Challenges.
ACM Trans. Cyber Phys. Syst., 2019

A business that can't lose: Investing in attacks against the Colombian power grid.
Int. J. Crit. Infrastructure Prot., 2019

Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices.
IEEE Secur. Priv., 2019

Mitigating Sensor Attacks Against Industrial Control Systems.
IEEE Access, 2019

Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

IEC 60870-5-104 Network Characterization of a Large-Scale Operational Power Grid.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Privacy and Security in Internet-Connected Cameras.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

A new metric to compare anomaly detection algorithms in cyber-physical systems.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

Enhancing the Resiliency of Cyber-Physical Systems with Software-Defined Networks.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

A Moving Target Defense to Detect Stealthy Attacks in Cyber-Physical Systems.
Proceedings of the 2019 American Control Conference, 2019

Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
Proceedings of the Applied Cryptography and Network Security, 2019

Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detection.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
DDDAS for Attack Detection and Isolation of Control Systems.
Proceedings of the Handbook of Dynamic Data Driven Applications Systems., 2018

Quantifying the Utility-Privacy Tradeoff in the Internet of Things.
ACM Trans. Cyber Phys. Syst., 2018

Leveraging Software-Defined Networking for Incident Response in Industrial Control Systems.
IEEE Softw., 2018

A Survey of Physics-Based Attack Detection in Cyber-Physical Systems.
ACM Comput. Surv., 2018

Virtual incident response functions in control systems.
Comput. Networks, 2018

ALERT: Adding a Secure Layer in Decision Support for Advanced Driver Assistance System (ADAS).
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

Measuring the Growth in Complexity of Models from Industrial Control Networks.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

A Virtual Environment for Industrial Control Systems: A Nonlinear Use-Case in Attack Detection, Identification, and Response.
Proceedings of the 4th Annual Industrial Control System Security Workshop, 2018

An Adaptive Real-Time Architecture for Zero-Day Threat Detection.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Cyber-Insurance for Cyber-Physical Systems.
Proceedings of the IEEE Conference on Control Technology and Applications, 2018

Temporal Phase Shifts in SCADA Networks.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

Constraining Attacker Capabilities Through Actuator Saturation.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
SDN and NFV Security: Challenges for Integrated Solutions.
Proceedings of the Guide to Security in SDN and NFV, 2017

Smart Grids.
IEEE Wirel. Commun., 2017

Integrity Attacks on Real-Time Pricing in Smart Grids: Impact and Countermeasures.
IEEE Trans. Smart Grid, 2017

Guest Editors' Introduction: Cyber-Physical Systems Security and Privacy.
IEEE Des. Test, 2017

Security and Privacy in Cyber-Physical Systems: A Survey of Surveys.
IEEE Des. Test, 2017

Corrections.
IEEE Des. Test, 2017

Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

Optimal Security Investments in a Prevention and Detection Game.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

Security and privacy trade-offs in CPS by leveraging inherent differential privacy.
Proceedings of the IEEE Conference on Control Technology and Applications, 2017

Optimal risk management in critical infrastructures against cyber-adversaries.
Proceedings of the IEEE Conference on Control Technology and Applications, 2017

Sexual Intimacy in the Age of Smart Devices: Are We Practicing Safe IoT?
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

Remote Proofs of Video Freshness for Public Spaces.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

Understanding Security Threats in Consumer Drones Through the Lens of the Discovery Quadcopter Family.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

Security & Privacy in Smart Toys.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

A New Burst-DFA model for SCADA Anomaly Detection.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

Security analysis of control system anomaly detectors.
Proceedings of the 2017 American Control Conference, 2017

Security vs. privacy: How integrity attacks can be masked by the noise of differential privacy.
Proceedings of the 2017 American Control Conference, 2017

2016
Cyber-Physical Security and Privacy [Guest editors' introduction].
IEEE Internet Comput., 2016

Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Modeling Modbus TCP for intrusion detection.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Limiting the Impact of Stealthy Attacks on Industrial Control Systems.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A multi-layered and kill-chain based security analysis framework for cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2015

How the quantity and quality of training data impacts re-identification of smart meter users?
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Detecting fraud in demand response programs.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Incentives for demand-response programs with nonlinear, piece-wise continuous electricity cost functions.
Proceedings of the American Control Conference, 2015

Using Visual Challenges to Verify the Integrity of Security Cameras.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures.
IEEE Trans. Smart Grid, 2014

Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks.
Int. J. Crit. Infrastructure Prot., 2014

Control Systems for the Power Grid and Their Resiliency to Attacks.
IEEE Secur. Priv., 2014

Effects of Risk on Privacy Contracts for Demand-Side Management.
CoRR, 2014

Attenuating the Impact of Integrity Attacks on Real-Time Pricing in Smart Grids.
CoRR, 2014

Quantifying the Utility-Privacy Tradeoff in the Smart Grid.
CoRR, 2014

On the practicality of detecting anomalies with encrypted traffic in AMI.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Timing of Cyber-Physical Attacks on Process Control Systems.
Proceedings of the Critical Infrastructure Protection VIII, 2014

Is this a good time?: deciding when to launch attacks on process control systems.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

From CRCs to resilient control systems: differentiating between reliability and security for the protection of cyber-physical systems.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Cyber-Physical Systems Attestation.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

Privacy and customer segmentation in the smart grid.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

Delay and sampling independence of a consensus algorithm and its application to smart grid privacy.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

CPS: market analysis of attacks against demand response in the smart grid.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Depth-First Forwarding (DFF) in Unreliable Networks.
RFC, June, 2013

Big Data Analytics for Security.
IEEE Secur. Priv., 2013

Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Resilience of Process Control Systems to Cyber-Physical Attacks.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

Data Handling in the Smart Grid: Do We Know Enough?
Proceedings of the Critical Infrastructure Protection VII, 2013

Controllability of Dynamical Systems: Threat Models and Reactive Security.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

2012
AMI threats, intrusion detection requirements and deployment recommendations.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Evaluating Electricity Theft Detectors in Smart Grid Networks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Comparison of data forwarding mechanisms for AMI networks.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

Fifth ACM workshop on artificial intelligence and security (AISec 2012).
Proceedings of the ACM Conference on Computer and Communications Security, 2012

A game theory model for electricity theft detection and privacy-aware control in AMI systems.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Attacks against process control systems: risk assessment, detection, and response.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Nudge: intermediaries' role in interdependent network security.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Semantic middleware for the Internet of Things.
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010

2009
Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments.
IEEE/ACM Trans. Netw., 2009

Understanding the physical and economic consequences of attacks on control systems.
Int. J. Crit. Infrastructure Prot., 2009

Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems.
Ad Hoc Networks, 2009

Safe and Secure Networked Control Systems under Denial-of-Service Attacks.
Proceedings of the Hybrid Systems: Computation and Control, 12th International Conference, 2009

2008
Research Challenges for the Security of Control Systems.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Secure Control: Towards Survivable Cyber-Physical Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Principled reasoning and practical applications of alert fusion in intrusion detection systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers.
J. Comput. Secur., 2007

Optimal ROC Curve for a Combination of Classifiers.
Proceedings of the Advances in Neural Information Processing Systems 20, 2007

Performance Comparison of Detection Schemes for MAC Layer Misbehavior.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

On Optimal Watermarking Schemes in Uncertain Gaussian Channels.
Proceedings of the International Conference on Image Processing, 2007

Towards Optimal Design of Data Hiding Algorithms Against Nonparametric Adversary Models.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

2006
Design and Evaluation of Decision Making Algorithms for Information Security.
PhD thesis, 2006

A Framework for the Evaluation of Intrusion Detection Systems.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Towards a secure and interoperable DRM architecture.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

B-ROC Curves for the Assessment of Classifiers over Imbalanced Data Sets.
Proceedings of the Proceedings, 2006

2004
Detection and prevention of MAC layer misbehavior in ad hoc networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004


  Loading...