Julian L. Rrushi

Orcid: 0000-0003-2291-0665

According to our database1, Julian L. Rrushi authored at least 43 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Decoy Processes With Optimal Performance Fingerprints.
IEEE Access, 2023

2022
Physics-Driven Page Fault Handling for Customized Deception against CPS Malware.
ACM Trans. Embed. Comput. Syst., 2022

Design and Emulation of Physics-Centric Cyberattacks on an Electrical Power Transformer.
IEEE Access, 2022

2021
DNIC Architectural Developments for 0-Knowledge Detection of OPC Malware.
IEEE Trans. Dependable Secur. Comput., 2021

Clustering Application for Data-Driven Prediction of Health Insurance Premiums for People of Different Ages.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

2020
Protecting Location Privacy for Crowd Workers in Spatial Crowdsourcing Using a Novel Dummy-Based Mechanism.
IEEE Access, 2020

Physics Reasoning for Intrusion Detection in Industrial Networks.
Proceedings of the Second IEEE International Conference on Trust, 2020

On Second-Order Detection of Webcam Spyware.
Proceedings of the 3rd International Conference on Information and Computer Technologies, 2020

A Blockchain and Defensive Deception Co-design for Webcam Spyware Detection.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Malware Detection via Machine Learning and Recognition of Non Stationary Tasks.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency.
Proceedings of the First IEEE International Conference on Trust, 2019

Machine Learning and Recognition of User Tasks for Malware Detection.
Proceedings of the First IEEE International Conference on Trust, 2019

Redirecting Malware's Target Selection with Decoy Processes.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

Multi-range Decoy I/O Defense of Electrical Substations Against Industrial Control System Malware.
Proceedings of the Resilience of Cyber-Physical Systems, 2019

2018
Model-driven Timing Consistency for Active Malware Redirection.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

2017
Plaintext side channels in TLS Chiphertex.
J. Comput. Virol. Hacking Tech., 2017

Phantom I/O projector: Entrapping malware on machines in production.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Network Forensic Analysis of Electrical Substation Automation Traffic.
Proceedings of the Critical Infrastructure Protection XI, 2017

Timing Performance Profiling of Substation Control Code for IED Malware Detection.
Proceedings of the 3rd Annual Industrial Control System Security Workshop, 2017

Keylogger Detection Using a Decoy Keyboard.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

On Sustaining Prolonged Interaction with Attackers.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Defending Electrical Substations Against 0-Day Malware Through Decoy I/O in Protective Relays.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Target Discovery Differentials for 0-Knowledge Detection of ICS Malware.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
NIC displays to thwart malware attacks mounted from within the OS.
Comput. Secur., 2016

Introduction to Cyberdeception
Springer, ISBN: 978-3-319-41187-3, 2016

2015
By-design vulnerabilities in the ANSI C12.22 protocol specification.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Big Data Computing for Digital Forensics on Industrial Control Systems.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

A Field Study of Digital Forensics of Intrusions in the Electrical Power Grid.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

2014
A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management.
J. Comput. Virol. Hacking Tech., 2014

Detecting Industrial Control Malware Using Automated PLC Code Analytics.
IEEE Secur. Priv., 2014

Data Interception through Broken Concurrency in Kernel Land.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

A Steganographic Approach to Localizing Botmasters.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2012
SCADA Protocol Vulnerabilities.
Proceedings of the Critical Infrastructure Protection, 2012

2011
Anomaly detection via statistical learning in industrial communication networks.
Int. J. Inf. Comput. Secur., 2011

An exploration of defensive deception in industrial communication networks.
Int. J. Crit. Infrastructure Prot., 2011

A Bayesian theory of confirmation for intrusion report fusion in process control networks.
Int. J. Crit. Comput. Based Syst., 2011

Estimating botnet virulence within mathematical models of botnet propagation dynamics.
Comput. Secur., 2011

A statistical approach to botnet virulence estimation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2009
Detecting Anomalies in Process Control Networks.
Proceedings of the Critical Infrastructure Protection III, 2009

2008
A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Detecting Cyber Attacks On Nuclear Power Plants.
Proceedings of the Critical Infrastructure Protection II, 2008

Combating Memory Corruption Attacks On Scada Devices.
Proceedings of the Critical Infrastructure Protection II, 2008

2005
Securing IPv6-Based Mobile Ad Hoc Networks Through an Artificial Immune System.
Proceedings of the Neural Nets, 16th Italian Workshop on Neural Nets, 2005


  Loading...