Robin Berthier

According to our database1, Robin Berthier authored at least 36 papers between 2006 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
A Response Cost Model for Advanced Metering Infrastructures.
IEEE Trans. Smart Grid, 2016

Cyber-Physical models for power grid security analysis: 8-substation case.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

An Internet-wide view of ICS devices.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2015
CPIndex: Cyber-Physical Vulnerability Assessment for Power-Grid Infrastructures.
IEEE Trans. Smart Grid, 2015

A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures.
IEEE Trans. Smart Grid, 2015

Seclius: An Information Flow-Based, Consequence-Centric Security Metric.
IEEE Trans. Parallel Distributed Syst., 2015

PLCloud: Comprehensive power grid PLC security monitoring with zero safety disruption.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

2014
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures.
IEEE Trans. Smart Grid, 2014

A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures.
IEEE Trans. Smart Grid, 2014

A risk assessment tool for advanced metering infrastructures.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

On the practicality of detecting anomalies with encrypted traffic in AMI.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Security of smart distribution grids: Data integrity attacks on integrated volt/VAR control and countermeasures.
Proceedings of the American Control Conference, 2014

2013
A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures.
IEEE J. Sel. Areas Commun., 2013

Secloud: A cloud-based comprehensive and lightweight security solution for smartphones.
Comput. Secur., 2013

Formal design of communication checkers for ICCP using UPPAAL.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Smart grid protocol testing through cyber-physical testbeds.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

2012
SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures.
IEEE Trans. Smart Grid, 2012

Learning from Early Attempts to Measure Information Security Performance.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

AMI threats, intrusion detection requirements and deployment recommendations.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Cost modeling of response actions for automated response and recovery in AMI.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

A Fuzzy Markov Model for scalable reliability analysis of Advanced Metering Infrastructure.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

Towards incorporating human intelligence into online security solutions.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

Safeguarding academic accounts and resources with the University Credential Abuse Auditing System.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
Characterizing Attackers and Attacks: An Empirical Study.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

Specification-Based Intrusion Detection for Advanced Metering Infrastructures.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

DarkNOC: Dashboard for Honeypot Management.
Proceedings of the Past, 2011

A cloud-based intrusion detection and response system for mobile phones.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

2009
An evaluation of connection characteristics for separating network attacks.
Int. J. Secur. Networks, 2009

Analyzing the process of installing rogue software.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
NASDAQ Velocity and Forces: An Interactive Visualization of Activity and Change.
J. Univers. Comput. Sci., 2008

On the Comparison of Network Attack Datasets: An Empirical Analysis.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

2007
Profiling Attacker Behavior Following SSH Compromises.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
A Statistical Analysis of Attack Data to Separate Attacks.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006


  Loading...