Marcelo Masera

Orcid: 0000-0003-4278-5419

According to our database1, Marcelo Masera authored at least 54 papers between 1997 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Understanding Communities From a New Functional Perspective in Power Grids.
IEEE Syst. J., 2022

Benchmark Models for Low-Voltage Networks: a Novel Open-Source Approach.
Proceedings of the Open Source Modelling and Simulation of Energy Systems, 2022

2020
Security assessment of cross-border electricity interconnections.
Reliab. Eng. Syst. Saf., 2020

2018
Smart (Electricity) Grids for Smart Cities: Assessing Roles and Societal Impacts.
Proc. IEEE, 2018

McSeg - Dynamic Management and Control of Smart Energy Grids.
Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2018

Absolute Scoring Scheme for Interoperability Testing of Advanced Metering Infrastructure on Demand Side Management.
Proceedings of the Ninth International Conference on Future Energy Systems, 2018

2017
Complex system governance for critical cyber-physical systems.
Int. J. Crit. Infrastructures, 2017

2015
Probabilistic modelling of security of supply in gas networks and evaluation of new infrastructure.
Reliab. Eng. Syst. Saf., 2015

2014
Congestion dependencies in the European gas pipeline network during crises.
Proceedings of the Complexity in Engineering, 2014

2013
The Emerging Energy Web
CoRR, 2013

2012
Cyber Vulnerability in Power Systems Operation and Control.
Proceedings of the Critical Infrastructure Protection, 2012

Critical State-Based Filtering System for Securing SCADA Network Protocols.
IEEE Trans. Ind. Electron., 2012

A cyber-physical experimentation environment for the security analysis of networked industrial control systems.
Comput. Electr. Eng., 2012

2011
A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems.
IEEE Trans. Ind. Informatics, 2011

Challenges for the security analysis of Next Generation Networks.
Inf. Secur. Tech. Rep., 2011

Approach to security assessment of critical infrastructures' information systems.
IET Inf. Secur., 2011

Using an Emulation Testbed for Operational Cyber Security Exercises.
Proceedings of the Critical Infrastructure Protection V, 2011

Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection V, 2011

2010
Simulating malware with MAlSim.
J. Comput. Virol., 2010

Infranomics.
Int. J. Crit. Infrastructures, 2010

An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure.
Int. J. Crit. Infrastructure Prot., 2010

Distributed Intrusion Detection System for SCADA Protocols.
Proceedings of the Critical Infrastructure Protection IV, 2010

Testing the Fidelity of an Emulab Testbed.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Studying Characteristics of an Emulab Testbed for Scientifically Rigorous Experiments.
Proceedings of the DS-RT '10 Proceedings of the 2010 IEEE/ACM 14th International Symposium on Distributed Simulation and Real Time Applications, 2010

State-Based Firewall for Industrial Protocols with Critical-State Prediction Monitor.
Proceedings of the Critical Information Infrastructures Security, 2010

Designing Repeatable Experiments on an Emulab Testbed.
Proceedings of the Broadband Communications, Networks, and Systems, 2010

Modbus/DNP3 State-Based Intrusion Detection System.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Risk Assessment of Malicious Attacks Against Power Systems.
IEEE Trans. Syst. Man Cybern. Part A, 2009

Integrating cyber attacks within fault trees.
Reliab. Eng. Syst. Saf., 2009

An experimental investigation of malware attacks on SCADA systems.
Int. J. Crit. Infrastructure Prot., 2009

Design and Implementation of a Secure Modbus Protocol.
Proceedings of the Critical Infrastructure Protection III, 2009

State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept.
Proceedings of the Critical Information Infrastructures Security, 2009

2008
The security of power systems and the role of information and communication technologies: lessons from the recent blackouts.
Int. J. Crit. Infrastructures, 2008

Effects of intentional threats to power substation control systems.
Int. J. Crit. Infrastructures, 2008

MAISim: mobile agent malware simulator.
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, 2008

Security Assessment Of A Turbo-Gas Power Plant.
Proceedings of the Critical Infrastructure Protection II, 2008

Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests.
Proceedings of the Intelligence and Security Informatics, 2008

Scada Malware, a Proof of Concept.
Proceedings of the Critical Information Infrastructure Security, 2008

Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks.
Proceedings of the Critical Information Infrastructure Security, 2008

2007
Critical infrastructures: the need for international risk governance.
Int. J. Crit. Infrastructures, 2007

A Service-Oriented Approach for Assessing Infrastructure Security.
Proceedings of the Critical Infrastructure Protection, 2007

Assurance Cases for Security: The Metrics Challenge.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

Design of a Platform for Information Exchange on Protection of Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2007

2006
A strategic approach to risk governance of critical infrastructures.
Int. J. Crit. Infrastructures, 2006

International Working Group on Assurance Cases (for Security).
IEEE Secur. Priv., 2006

Interdependencies and Security Assessment: a Dependability view.
Proceedings of the IEEE International Conference on Systems, 2006

Emergent Disservices in Interdependent Systems and System-of-Systems.
Proceedings of the IEEE International Conference on Systems, 2006

Through the Description of Attacks: A Multidimensional View.
Proceedings of the Computer Safety, 2006

2002
A context-related authorization and access control method based on RBAC.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

2000
Trust requirements in e-business.
Commun. ACM, 2000

1998
Requirements engineering and industrial uptake.
Requir. Eng., 1998

Dependable Embedded Systems: The Challenges for Requirements Engineering.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 1998

1997
Integration of Safety Requirements in the Initial Phases of the Project Lifecycle of Hardware/Software Systems.
Proceedings of the 16th International Conference on Computer Safety, 1997

Industrial Workshop on Requirements for R&D in Requirements Engineering.
Proceedings of the 3rd IEEE International Symposium on Requirements Engineering (RE'97), 1997


  Loading...