Daisuke Mashima

Orcid: 0000-0003-1946-1790

According to our database1, Daisuke Mashima authored at least 66 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers.
CoRR, 2024

2023
Message Authentication and Provenance Verification for Industrial Control Systems.
ACM Trans. Cyber Phys. Syst., October, 2023

Analysis of False Data Injection Attacks Against Automated Control for Parallel Generators in IEC 61850-Based Smart Grid Systems.
IEEE Syst. J., September, 2023

An open-source framework for publishing/subscribing IEC 61850 R-GOOSE and R-SV.
SoftwareX, July, 2023

Cybersecurity for Modern Smart Grid Against Emerging Threats.
Found. Trends Priv. Secur., 2023

Taxonomy of Fingerprinting Techniques for Evaluation of Smart Grid Honeypot Realism.
Proceedings of the IEEE International Conference on Communications, 2023

On Design and Implementation of Real-time, High-fidelity Virtual Power System for Smart Grid Cyber Range.
Proceedings of the IEEE International Conference on Communications, 2023

Comparative Study on Smart Grid Security Testbeds Using MITRE ATT&CK Matrix.
Proceedings of the IEEE International Conference on Communications, 2023

End-to-End Performance Evaluation of R-SV / R-GOOSE Messages for Wide Area Protection and Control Applications.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2023

Machine Learning Assisted Bad Data Detection for High-Throughput Substation Communication.
Proceedings of the IEEE International Conference on Communications, 2023

Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems.
IEEE Trans. Smart Grid, 2022

<i>OpenPLC61850</i>: An IEC 61850 MMS compatible open source PLC for smart grid research.
SoftwareX, 2022

IEC 61850 Compatible OpenPLC for Cyber Attack Case Studies on Smart Substation Systems.
IEEE Access, 2022

Predicting Resilience of Interdependent Urban Infrastructure Systems.
IEEE Access, 2022

Evaluating Synthetic Datasets for Training Machine Learning Models to Detect Malicious Commands.
Proceedings of the IEEE International Conference on Communications, 2022

Analysis of Message Authentication Solutions for IEC 61850 in Substation Automation Systems.
Proceedings of the IEEE International Conference on Communications, 2022

Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning.
Proceedings of the IEEE International Conference on Communications, 2022

Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems.
Proceedings of the IEEE INFOCOM 2022, 2022

GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

CPSS '22: 8th ACM Cyber-Physical System Security Workshop.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Machine Learning-Based Intrusion Detection for Achieving Cybersecurity in Smart Grids Using IEC 61850 GOOSE Messages.
Symmetry, 2021

An IEC 61850 MMS Traffic Parser for Customizable and Efficient Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2021

vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021

Cyber-Attack Case Studies on Dynamic Voltage Restorer in Smart Grid.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Electricity Theft Pinpointing Through Correlation Analysis of Master and Individual Meter Readings.
IEEE Trans. Smart Grid, 2020

On Design and Enhancement of Smart Grid Honeypot System for Practical Collection of Threat Intelligence.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

False Data Injection Cyber Range of Modernized Substation System.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

An Attack-Trace Generating Toolchain for Cybersecurity Study of IEC61850 based Substations.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

DecIED: Scalable k-Anonymous Deception for IEC61850-Compliant Smart Grid Systems.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

2019
Artificial Command Delaying for Secure Substation Remote Control: Design and Implementation.
IEEE Trans. Smart Grid, 2019

PowerNet: Neural Power Demand Forecasting in Smart Grid.
CoRR, 2019

F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Synthesized Dataset for Cybersecurity Study of IEC 61850 based Substation.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Who's Scanning Our Smart Grid? Empirical Study on Honeypot Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing.
ICT Express, 2018

Securing Substations through Command Authentication Using On-the-fly Simulation of Power System Dynamics.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Analysis and enhancement of RPL under packet drop attacks.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

On Practical Threat Scenario Testing in an Electric Power ICS Testbed.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

2017
Towards a grid-wide, high-fidelity electrical substation honeynet.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

2016
SPOT: A smartphone-based platform to tackle heterogeneity in smart-home IoT systems.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

An active command mediation approach for securing remote control interface of substations.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Residential demand response system framework leveraging IoT devices.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Optimizing economic operations for residential demand response programs.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference Europe, 2016

SPOT: a smartphone-based control app with a device-agnostic and adaptive user-interface for IoT devices.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

SoftGrid: A Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

2015
Authenticated down-sampling for privacy-preserving energy usage data sharing.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

How the quantity and quality of training data impacts re-identification of smart meter users?
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

2014
Privacy preserving disclosure of authenticated energy usage data.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

OpenADR 2.0 deployment architectures: Options and implications.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

On the practicality of detecting anomalies with encrypted traffic in AMI.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Enhancing Demand Response signal verification in automated Demand Response systems.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

Towards Secure Demand-Response Systems on the Cloud.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

2013
Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Customer-centric energy usage data management and sharing in smart grid systems.
Proceedings of the SEGS'13, 2013

2012
Safeguarding health data with enhanced accountability and patient awareness.
PhD thesis, 2012

Visualizing Dynamic Data with Maps.
IEEE Trans. Vis. Comput. Graph., 2012

Enabling Robust Information Accountability in E-healthcare Systems.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Evaluating Electricity Theft Detectors in Smart Grid Networks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Enhancing accountability of electronic health record usage via patient-centric monitoring.
Proceedings of the ACM International Health Informatics Symposium, 2012

2011
Privacy settings from contextual attributes: A case study using Google Buzz.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

2010
Protecting E-healthcare Client Devices against Malware and Physical Theft.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

2009
User-Centric Handling of Identity Agent Compromise.
Proceedings of the Computer Security, 2009

Using identity credential usage logs to detect anomalous service accesses.
Proceedings of the 5th Workshop on Digital Identity Management, 2009


  Loading...