Christos Siaterlis

According to our database1, Christos Siaterlis authored at least 26 papers between 2004 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Physical process resilience-aware network design for SCADA systems.
Comput. Electr. Eng., 2014

Cyber-physical testbeds.
Commun. ACM, 2014

2013
EPIC: A Testbed for Scientifically Rigorous Cyber-Physical Security Experimentation.
IEEE Trans. Emerg. Top. Comput., 2013

Analysis of the effects of distributed denial-of-service attacks on MPLS networks.
Int. J. Crit. Infrastructure Prot., 2013

On the Use of Emulab Testbeds for Scientifically Rigorous Experiments.
IEEE Commun. Surv. Tutorials, 2013

Recreating a Large-Scale BGP Incident in a Realistic Environment.
Proceedings of the Information Sciences and Systems 2013, 2013

Data fusion-base anomay detection in networked critical infrastructures.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
Impact of Network Infrastructure Parameters to the Effectiveness of Cyber Attacks Against Industrial Control Systems.
Int. J. Comput. Commun. Control, 2012

A cyber-physical experimentation environment for the security analysis of networked industrial control systems.
Comput. Electr. Eng., 2012

An Experimental Study on the Impact of Network Segmentation to the Resilience of Physical Processes.
Proceedings of the NETWORKING 2012, 2012

Enabling the Exploration of Operating Procedures in Critical Infrastructures.
Proceedings of the Critical Infrastructure Protection VI, 2012

A method to construct network traffic models for process control systems.
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, 2012

AMICI: An Assessment Platform for Multi-domain Security Experimentation on Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2012

2011
Using Soft Real-Time Simulation in a Hybrid Environment for Cyber-Physical Security Experiments.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011

Developing cyber-physical experimental capabilities for the security analysis of the future Smart Grid.
Proceedings of the 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies", 2011

Using an Emulation Testbed for Operational Cyber Security Exercises.
Proceedings of the Critical Infrastructure Protection V, 2011

Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection V, 2011

Investigating the Effect of Network Parameters on Coordinated Cyber Attacks against a Simulated Power Plant.
Proceedings of the Critical Information Infrastructure Security, 2011

2010
A Preliminary Study of a Wireless Process Control Network Using Emulation Testbeds.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

Testing the Fidelity of an Emulab Testbed.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Studying Characteristics of an Emulab Testbed for Scientifically Rigorous Experiments.
Proceedings of the DS-RT '10 Proceedings of the 2010 IEEE/ACM 14th International Symposium on Distributed Simulation and Real Time Applications, 2010

Designing Repeatable Experiments on an Emulab Testbed.
Proceedings of the Broadband Communications, Networks, and Systems, 2010

2005
One step ahead to multisensor data fusion for DDoS detection.
J. Comput. Secur., 2005

Detecting Incoming and Outgoing DDoS Attacks at the Edge Using a Single Set of Network Characteristics.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

2004
Towards multisensor data fusion for DoS detection.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Detecting DDoS attacks with passive measurement based heuristics.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004


  Loading...