John Henry Castellanos

Orcid: 0000-0003-3368-400X

According to our database1, John Henry Castellanos authored at least 16 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Selective Encryption Framework for Securing Communication in Industrial Control Systems.
Proceedings of the IEEE International Conference on Communications, 2023

Provable Adversarial Safety in Cyber-Physical Systems.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023

Preventing Reverse Engineering of Control Programs in Industrial Control Systems.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023

2022
Timing Analysis of GOOSE in a Real-World Substation.
Proceedings of the IEEE International Conference on Communications, 2022

Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2020
Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

2019
Evaluating Cascading Effects of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
CoRR, 2019

A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Enforcing Memory Safety in Cyber-Physical Systems.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

Legacy-Compliant Data Authentication for Industrial Control System Traffic.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Q-Floid: Android Malware detection with Quantitative Data Flow Graphs.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016


  Loading...