Jonathan Butts

According to our database1, Jonathan Butts authored at least 27 papers between 2005 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Evaluating the readiness of cyber first responders responsible for critical infrastructure protection.
Int. J. Crit. Infrastructure Prot., 2016

Using timing-based side channels for anomaly detection in industrial control systems.
Int. J. Crit. Infrastructure Prot., 2016

2015
How Industrial Control System Security Training is Falling Short.
Proceedings of the Critical Infrastructure Protection IX, 2015

2014
An evaluation of modification attacks on programmable logic controllers.
Int. J. Crit. Infrastructure Prot., 2014

Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices.
Int. J. Crit. Infrastructure Prot., 2014

Evaluation of security solutions in the SCADA environment.
Data Base, 2014

Detecting Integrity Attacks on Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection VIII, 2014

Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection.
Proceedings of the Critical Infrastructure Protection VIII, 2014

2013
Enhancing the security of aircraft surveillance in the next generation air traffic control system.
Int. J. Crit. Infrastructure Prot., 2013

Firmware modification attacks on programmable logic controllers.
Int. J. Crit. Infrastructure Prot., 2013

Design and Implementation of Industrial Control System Emulators.
Proceedings of the Critical Infrastructure Protection VII, 2013

ADS-B encryption: confidentiality in the friendly skies.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
A Firmware Verification Tool for Programmable Logic Controllers.
Proceedings of the Critical Infrastructure Protection VI, 2012

Quantifying Controller Resilience Using Behavior Characterization.
Proceedings of the Critical Infrastructure Protection VI, 2012

2011
A signaling framework to deter aggression in cyberspace.
Int. J. Crit. Infrastructure Prot., 2011

Security analysis of the ADS-B implementation in the next generation air transportation system.
Int. J. Crit. Infrastructure Prot., 2011

Exploiting the critical infrastructure via nontraditional system inputs.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Applying public health strategies to the protection of cyberspace.
Int. J. Crit. Infrastructure Prot., 2010

An analysis of the legality of government-mandated computer inoculations.
Int. J. Crit. Infrastructure Prot., 2010

Security Analysis of the MPLS Label Distribution Protocol.
Proceedings of the Critical Infrastructure Protection IV, 2010

Modeling Control System Failures and Attacks - The Waterloo Campaign to Oil Pipelines.
Proceedings of the Critical Infrastructure Protection IV, 2010

2009
Analysis of security threats to MPLS virtual private networks.
Int. J. Crit. Infrastructure Prot., 2009

Password Cracking Using Sony Playstations.
Proceedings of the Advances in Digital Forensics V, 2009

A Taxonomy of Attacks on the DNP3 Protocol.
Proceedings of the Critical Infrastructure Protection III, 2009

Providing Situational Awareness for Pipeline Control Operations.
Proceedings of the Critical Infrastructure Protection III, 2009

2008
Security analysis of RSVP-TE signaling in MPLS networks.
Int. J. Crit. Infrastructure Prot., 2008

2005
Developing an Insider Threat Model Using Functional Decomposition.
Proceedings of the Computer Network Security, 2005


  Loading...