Stephen D. Wolthusen

According to our database1, Stephen D. Wolthusen authored at least 133 papers between 1999 and 2018.

Collaborative distances :
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution.
Proceedings of the Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living, 2018

A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements.
Proceedings of the Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living, 2018

Efficient control recovery for resilient control systems.
Proceedings of the 15th IEEE International Conference on Networking, Sensing and Control, 2018

Security-Aware Network Analysis for Network Controllability.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

Privacy Risks in Resource Constrained Smart Micro-Grids.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
OCPP Protocol: Security Threats and Challenges.
IEEE Trans. Smart Grid, 2017

TACTICS: Validation of the security framework developed for tactical SOA.
J. Inf. Sec. Appl., 2017

Security Requirements for the Deployment of Services Across Tactical SOA.
Proceedings of the Computer Network Security, 2017

Measurement re-ordering attacks on power system state estimation.
Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2017

Towards Composable Threat Assessment for Medical IoT (MIoT).
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017

Security Infrastructure for Service Oriented Architectures at the Tactical Edge.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

Iterative recovery of controllability via maximum matching.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

A Smart Micro-Grid Architecture for Resource Constrained Environments.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Policy enforcement system for secure interoperable control in distributed Smart Grid systems.
J. Network and Computer Applications, 2016

Interoperability of security and quality of Service Policies Over Tactical SOA.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Multigraph Critical Infrastructure Model.
Proceedings of the Critical Infrastructure Protection X, 2016

Limitations of IEC62351-3's public key management.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures.
Proceedings of the Future Network Systems and Security - Second International Conference, 2016

Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

A Security Policy Infrastructure for Tactical Service Oriented Architectures.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol.
Proceedings of the Critical Information Infrastructures Security, 2016

Reliable Key Distribution in Smart Micro-Grids.
Proceedings of the Critical Information Infrastructures Security, 2016

Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating.
Proceedings of the Critical Information Infrastructures Security, 2016

Key Management for Secure Demand Data Communication in Constrained Micro-Grids.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Privacy Violations in Constrained Micro-Grids: Adversarial Cases.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
TACTICS: TACTICal Service Oriented Architecture.
CoRR, 2015

Delay and jitter attacks on hierarchical state estimation.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Distributed security policies for service-oriented architectures over tactical networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Inferring relevance and presence of evidence in service-oriented and SaaS architectures.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Secure distributed demand projection in micro-grids.
Proceedings of the 2015 Global Information Infrastructure and Networking Symposium, 2015

Modelling interdependencies over incomplete join structures of power law networks.
Proceedings of the 11th International Conference on the Design of Reliable Communication Networks, 2015

A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids.
Proceedings of the Critical Information Infrastructures Security, 2015

Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes.
Proceedings of the Critical Information Infrastructures Security, 2015

MPLS Policy Target Recognition Network.
Proceedings of the Risks and Security of Internet and Systems, 2015

Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Mitigation of Cloud-Internal Denial of Service Attacks.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

A model for robust distributed hierarchical electric power grid state estimation.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

Dynamic forced partitioning of robust hierarchical state estimators for power networks.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.
Proceedings of the Critical Infrastructure Protection VIII, 2014

Recovery of Structural Controllability for Control Systems.
Proceedings of the Critical Infrastructure Protection VIII, 2014

Reconstruction of structural controllability over Erdős-Rényi graphs via power dominating sets.
Proceedings of the Cyber and Information Security Research Conference, 2014

An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms.
Proceedings of the Critical Information Infrastructures Security, 2014

Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use.
Proceedings of the Critical Information Infrastructures Security, 2014

Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems.
Proceedings of the Communications and Multimedia Security, 2014

Malicious MPLS Policy Engine Reconnaissance.
Proceedings of the Communications and Multimedia Security, 2014

2013
Locating subverted processes using random packet comparison in SCADA systems.
IJCIS, 2013

Asynchronous message-passing binary consensus over non-complete graphs.
Proceedings of the 2nd IEEE Network Science Workshop, 2013

Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines.
Proceedings of the Network and System Security - 7th International Conference, 2013

Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs.
Proceedings of the Information Security, 16th International Conference, 2013

Forensic entropy analysis of microsoft windows storage volumes.
Proceedings of the 2013 Information Security for South Africa, 2013

An analysis of service degradation attacks against real-time MPLS networks.
Proceedings of the 2013 Information Security for South Africa, 2013

Malicious false data injection in hierarchical electric power grid state estimation systems.
Proceedings of the Fourth International Conference on Future Energy Systems, 2013

Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal.
Proceedings of the Critical Information Infrastructures Security, 2013

Robust Coordination of Cloud-Internal Denial of Service Attacks.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
Modelling Approaches.
Proceedings of the Critical Infrastructure Protection, 2012

Overview of Critical Information Infrastructure Protection.
Proceedings of the Critical Infrastructure Protection, 2012

Algorithmic approach for clandestine localisation and tracking in short-range environments.
IJCNDS, 2012

A model for partially asynchronous observation of malicious behavior.
Proceedings of the 2012 Information Security for South Africa, 2012

Forensic Tracking and Mobility Prediction in Vehicular Networks.
Proceedings of the Advances in Digital Forensics VIII, 2012

Agent Interaction and State Determination in SCADA Systems.
Proceedings of the Critical Infrastructure Protection VI, 2012

Detecting anomalies in IaaS environments through virtual machine host system call analysis.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2012

Towards Concurrent Data Sampling Using GPU Coprocessing.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Next generation networks.
Inf. Sec. Techn. Report, 2011

Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

A propagation model of a vulnerability mitigation computer worm - seawave.
Proceedings of the 5th International Conference on Network and System Security, 2011

A Plant-Wide Industrial Process Control Security Problem.
Proceedings of the Critical Infrastructure Protection V, 2011

Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation.
Proceedings of the Critical Information Infrastructure Security, 2011

2010
Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation.
Proceedings of the Information Security South Africa Conference 2010, 2010

Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic Topology Information.
Proceedings of the Information Security South Africa Conference 2010, 2010

Host-Based Security Sensor Integrity in Multiprocessing Environments.
Proceedings of the Information Security, 2010

A link-layer-based self-replicating vulnerability discovery agent.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Teeth Segmentation and Feature Extraction for Odontological Biometrics.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Forensic Tracking and Mobility Prediction in Vehicular Networks.
Proceedings of the Advances in Digital Forensics VI, 2010

Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes.
Proceedings of the Critical Infrastructure Protection IV, 2010

Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments.
Proceedings of the Critical Infrastructure Protection IV, 2010

On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

A Formal Adversary Capability Model for SCADA Environments.
Proceedings of the Critical Information Infrastructures Security, 2010

Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion.
Proceedings of the Communications and Multimedia Security, 2010

Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism.
Proceedings of the ARES 2010, 2010

2009
Editorial.
Computers & Security, 2009

Integrating Information Security with Information System Architecture and Administration Curricula.
Proceedings of the Information Security South Africa Conference 2009, 2009

Overcast: Forensic Discovery in Cloud Environments.
Proceedings of the IMF 2009, 2009

Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination.
Proceedings of the IMF 2009, 2009

Feature Correlation Attack on Biometric Privacy Protection Schemes.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Non-Forensic Odontological Biometrics.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Advancing Digital Forensics.
Proceedings of the Information Assurance and Security Education and Training, 2009

Using Physical Models for Anomaly Detection in Control Systems.
Proceedings of the Critical Infrastructure Protection III, 2009

A Security Analysis of Biometric Template Protection Schemes.
Proceedings of the Image Analysis and Recognition, 6th International Conference, 2009

A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2009

2008
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs.
IACR Cryptology ePrint Archive, 2008

Editorial.
Computers & Security, 2008

From the Editor-in-Chief.
Computers & Security, 2008

Editorial.
Computers & Security, 2008

Editorial.
Computers & Security, 2008

Network Forensics of Partial SSL/TLS Encrypted Traffic Classification Using Clustering Algorithms.
Proceedings of the IT-Incidents Management & IT-Forensics, 2008

Using Observations of Invariant Behaviour to Detect Malicious Agency in Distributed Environments.
Proceedings of the IT-Incidents Management & IT-Forensics, 2008

Visible-Spectrum Biometric Retina Recognition.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Modeling And Detecting Anomalies In Scada Systems.
Proceedings of the Critical Infrastructure Protection II, 2008

Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
Proceedings of the Computer Security, 2008

08102 Outcome Working Group -- Situational Awareness.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

2007
ISTR special issue on critical infrastructure protection.
Inf. Sec. Techn. Report, 2007

Connectivity models of interdependency in mixed-type critical infrastructure networks.
Inf. Sec. Techn. Report, 2007

Vertrauenswürdige Protokollierung - Protokollierung mittels nicht-deterministischer nebenläufiger wechselseitiger Überwachung.
Datenschutz und Datensicherheit, 2007

The Role of Mathematics in Information Security Education.
Proceedings of the Fifth World Conference on Information Security Education, 2007

Multigraph Dependency Models for Heterogeneous Infrastructures.
Proceedings of the Critical Infrastructure Protection, 2007

A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2007

An Analysis of Cyclical Interdependencies in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2007

Modeling Network Security Services in Tactical Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Graph Models of Critical Infrastructure Interdependencies.
Proceedings of the Inter-Domain Management, 2007

2006
Windows device interface security.
Inf. Sec. Techn. Report, 2006

Revisionssichere Protokollierung in Standardbetriebssystemen.
Datenschutz und Datensicherheit, 2006

Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006

Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006

2005
Enforcing Messaging Security Policies.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

Critical (Information) Infrastructure Protection.
Proceedings of the INFORMATIK 2005, 2005

A Capability-Based Transparent Cryptographic File System.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

2003
A model independent security architecture for distributed heterogeneous systems.
PhD thesis, 2003

A Distributed Multipurpose Mail Guard (Blinded).
Proceedings of the IEEE Systems, 2003

Goalkeeper: Close-In Interface Protection.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

Techniques and Applications of Digital Watermarking and Content Protection.
Artech House computer security series, Artech House, ISBN: 978-1-58053-111-5, 2003

2002
Access and Use Control using Externally Controlled Reference Monitors.
Operating Systems Review, 2002

Sensitivity labels and invisible identification markings in human-readable output.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

2001
Tracing data diffusion in industrial research with robust watermarking.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

Transparent Access To Encrypted Data Using Operating System Network Stack Extensions.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

Security Policy Enforcement at the File System Level in the Windows NT Operating System Family.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

1999
Digital Watermarking: From Concepts to Real-Time Video Applications.
IEEE Computer Graphics and Applications, 1999


  Loading...