Béla Genge

According to our database1, Béla Genge authored at least 42 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Engineering security-aware control applications for data authentication in smart industrial cyber-physical systems.
Future Generation Comp. Syst., 2019

2018
A Testbed for Performing Security Experiments with Software-Defined Industrial Control Systems.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

2017
Designing Optimal and Resilient Intrusion Detection Architectures for Smart Grids.
IEEE Trans. Smart Grid, 2017

Cyber-Security-Aware Network Design of Industrial Control Systems.
IEEE Systems Journal, 2017

Using Sensitivity Analysis and Cross-Association for the Design of Intrusion Detection Systems in Industrial Cyber-Physical Systems.
IEEE Access, 2017

Cross-layer anomaly detection in industrial cyber-physical systems.
Proceedings of the 25th International Conference on Software, 2017

Optimally scheduled interventions in the presence of vulnerabilities for modern cyber-physical systems.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Design, verification and implementation of a lightweight remote attestation protocol for process control systems.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Software Defined Response and Network Reconfiguration for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XI, 2017

Enforcing End-to-End Security in Scada Systems via Application-Level Cryptography.
Proceedings of the Critical Infrastructure Protection XI, 2017

2016
ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services.
Security and Communication Networks, 2016

A framework for designing resilient distributed intrusion detection systems for critical infrastructures.
IJCIP, 2016

A hierarchical control plane for software-defined networks-based industrial control systems.
Proceedings of the 2016 IFIP Networking Conference, 2016

A Methodology for Monitoring and Control Network Design.
Proceedings of the Critical Information Infrastructures Security, 2016

2015
A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures.
IJCIP, 2015

Experimental assessment of network design approaches for protecting industrial control systems.
IJCIP, 2015

Non-Intrusive Historical Assessment of Internet-Facing Services in the Internet of Things.
Proceedings of the International Conference on Recent Achievements in Mechatronics, 2015

A clustering-based approach to detect cyber attacks in process control systems.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

Resilience in the Internet of Things: The Software Defined Networking approach.
Proceedings of the IEEE International Conference on Intelligent Computer Communication and Processing, 2015

A framework for testing stealthy attacks in energy grids.
Proceedings of the IEEE International Conference on Intelligent Computer Communication and Processing, 2015

A Linear Programming Approach for K-Resilient and Reliability-Aware Design of Large-Scale Industrial Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 14th International Conference, 2015

2014
Physical process resilience-aware network design for SCADA systems.
Computers & Electrical Engineering, 2014

Cyber-physical testbeds.
Commun. ACM, 2014

A connection pattern-based approach to detect network traffic anomalies in critical infrastructures.
Proceedings of the Seventh European Workshop on System Security, 2014

2013
EPIC: A Testbed for Scientifically Rigorous Cyber-Physical Security Experimentation.
IEEE Trans. Emerging Topics Comput., 2013

Analysis of the effects of distributed denial-of-service attacks on MPLS networks.
IJCIP, 2013

On the Use of Emulab Testbeds for Scientifically Rigorous Experiments.
IEEE Communications Surveys and Tutorials, 2013

Data fusion-base anomay detection in networked critical infrastructures.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
A cyber-physical experimentation environment for the security analysis of networked industrial control systems.
Computers & Electrical Engineering, 2012

An Experimental Study on the Impact of Network Segmentation to the Resilience of Physical Processes.
Proceedings of the NETWORKING 2012, 2012

Enabling the Exploration of Operating Procedures in Critical Infrastructures.
Proceedings of the Critical Infrastructure Protection VI, 2012

A method to construct network traffic models for process control systems.
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, 2012

AMICI: An Assessment Platform for Multi-domain Security Experimentation on Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2012

2011
Using Soft Real-Time Simulation in a Hybrid Environment for Cyber-Physical Security Experiments.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011

Developing cyber-physical experimental capabilities for the security analysis of the future Smart Grid.
Proceedings of the 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies", 2011

Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection V, 2011

Investigating the Effect of Network Parameters on Coordinated Cyber Attacks against a Simulated Power Plant.
Proceedings of the Critical Information Infrastructure Security, 2011

2009
Towards Automated Secure Web Service Execution.
Proceedings of the NETWORKING 2009, 2009

A syntactic approach for identifying multi-protocol attacks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Middleware for Automated Implementation of Security Protocols.
Proceedings of the Semantic Web: Research and Applications, 2009

2008
A Modeling Framework for Generating Security Protocol Specifications.
Proceedings of the SYNASC 2008, 2008

Constructing Security Protocol Specifications for Web Services.
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008


  Loading...