Mason Rice

According to our database1, Mason Rice authored at least 28 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems.
Proceedings of the Critical Infrastructure Protection XVI, 2022

Detecting Part Anomalies Induced by Cyber Attacks on a Powder BED Fusion Additive Manufacturing System.
Proceedings of the Critical Infrastructure Protection XVI, 2022

2017
A cyber risk scoring system for medical devices.
Int. J. Crit. Infrastructure Prot., 2017

Improving the cyber resilience of industrial control systems.
Int. J. Crit. Infrastructure Prot., 2017

Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections.
Int. J. Crit. Infrastructure Prot., 2017

Misuse-based detection of Z-Wave network attacks.
Comput. Secur., 2017

Securing Bluetooth low Energy Locks from Unauthorizedaccess and Surveillance.
Proceedings of the Critical Infrastructure Protection XI, 2017

Categorization of Cyber Training Environments for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XI, 2017

Defending Building Automation Systems Using DECOY Networks.
Proceedings of the Critical Infrastructure Protection XI, 2017

Generating Honeypot Traffic for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XI, 2017

Multi-Controller Exercise Environments for Training Industrial Control System First Responders.
Proceedings of the Critical Infrastructure Protection XI, 2017

2016
A framework for incorporating insurance in critical infrastructure cyber risk strategies.
Int. J. Crit. Infrastructure Prot., 2016

Evaluating the readiness of cyber first responders responsible for critical infrastructure protection.
Int. J. Crit. Infrastructure Prot., 2016

Using timing-based side channels for anomaly detection in industrial control systems.
Int. J. Crit. Infrastructure Prot., 2016

Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment.
Proceedings of the Critical Infrastructure Protection X, 2016

Practical Application Layer Emulation in Industrial Control System Honeypots.
Proceedings of the Critical Infrastructure Protection X, 2016

2015
Constructing cost-effective and targetable industrial control system honeypots for production networks.
Int. J. Crit. Infrastructure Prot., 2015

Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets.
Proceedings of the Critical Infrastructure Protection IX, 2015

2014
Whither cyberpower?
Int. J. Crit. Infrastructure Prot., 2014

The anatomy of a cyber power.
Int. J. Crit. Infrastructure Prot., 2014

2012
Implementing novel reactive defense functionality in MPLS networks using hyperspeed signaling.
Int. J. Crit. Infrastructure Prot., 2012

2011
May the US government monitor private critical infrastructure assets to combat foreign cyberspace threats?
Int. J. Crit. Infrastructure Prot., 2011

A signaling framework to deter aggression in cyberspace.
Int. J. Crit. Infrastructure Prot., 2011

Using Deception to Shield Cyberspace Sensors.
Proceedings of the Critical Infrastructure Protection V, 2011

Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed Signaling.
Proceedings of the Critical Infrastructure Protection V, 2011

2010
Applying public health strategies to the protection of cyberspace.
Int. J. Crit. Infrastructure Prot., 2010

An analysis of the legality of government-mandated computer inoculations.
Int. J. Crit. Infrastructure Prot., 2010

Modeling Control System Failures and Attacks - The Waterloo Campaign to Oil Pipelines.
Proceedings of the Critical Infrastructure Protection IV, 2010


  Loading...