Scott Knight

According to our database1, Scott Knight authored at least 28 papers between 2003 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Offensive Cyber Security Trainer for Platform Management Systems.
Proceedings of the IEEE International Systems Conference, 2021

2018
A systematic approach of feature selection for encrypted network traffic classification.
Proceedings of the 2018 Annual IEEE International Systems Conference, 2018

ORGODEX: Authorization as a service (AaaS).
Proceedings of the 2018 Annual IEEE International Systems Conference, 2018

ORGODEX: Service Portfolios for the Cloud.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
A timing-based covert channel for SCADA networks.
Proceedings of the 2017 International Conference on Cyber Conflict, 2017

2016
A Modbus command and control channel.
Proceedings of the Annual IEEE Systems Conference, 2016

Start Here: Engineering Scalable Access Control Systems.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

2015
Towards Managed Role Explosion.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

2014
USBcat - Towards an Intrusion Surveillance Toolset.
Proceedings of the Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, 2014

Not all SCADA is Equal: Impact of Control Models on ICS Threat Landscape.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

Modelling physical impact of cyber attacks.
Proceedings of the Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2014

2013
An isolated virtual cluster for SCADA network security research.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

2011
Compromise through USB-based Hardware Trojan Horse device.
Future Gener. Comput. Syst., 2011

Spy vs. Spy: counter-intelligence methods for backtracking malicious intrusions.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2011

2010
Role Explosion: Acknowledging the Problem.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010

2009
One Employee and Several Applications: An Information Management Case Study.
Proceedings of the 2009 International Conference on Software Engineering Research & Practice, 2009

Hardware Trojan Horse Device Based on Unintended USB Channels.
Proceedings of the Third International Conference on Network and System Security, 2009

Permutation-based steganographic channels.
Proceedings of the CRiSIS 2009, 2009

2007
The International Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services.
Int. J. Inf. Sec., 2007

2006
A lightweight approach to state based security testing.
Proceedings of the 2006 conference of the Centre for Advanced Studies on Collaborative Research, 2006

Packet decoding using context sensitive parsing.
Proceedings of the 2006 conference of the Centre for Advanced Studies on Collaborative Research, 2006

2005
A Passive External Web Surveillance Technique for Private Networks.
Proceedings of the Computer Network Security, 2005

The Narrative and Ludic Nexus in Computer Games: Diverse Worlds II.
Proceedings of the Digital Games Research Conference 2005, 2005

SCL: a language for security testing of network applications.
Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative Research, 2005

2004
Syntax-based Vulnerability Testing of Frame-based Network Protocols.
Proceedings of the Second Annual Conference on Privacy, 2004

2003
Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Concerning Enterprise Network Vulnerability to HTTP Tunneling.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

The Diverse Worlds of Computer Games: A Content Analysis of Spaces, Populations, Styles and Narratives.
Proceedings of the Digital Games Research Conference 2003, 2003


  Loading...