Stephen Dunlap

Affiliations:
  • Air Force Institute of Technology OH, USA


According to our database1, Stephen Dunlap authored at least 17 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Evaluating the Use of Boot Image Encryption on the TALOS II Architecture.
Proceedings of the Critical Infrastructure Protection XVI, 2022

2021
Anomaly Detection in Automation Controllers.
Proceedings of the Critical Infrastructure Protection XV, 2021

InfiniBand Network Monitoring: Challenges and Possibilities.
Proceedings of the Critical Infrastructure Protection XV, 2021

2020
Securing an InfiniBand Network and its Effect on Performance.
Proceedings of the Critical Infrastructure Protection XIV, 2020

2019
Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes.
Proceedings of the Critical Infrastructure Protection XIII, 2019

Vehicle Identification and Route Reconstruction via TPMS Data Leakage.
Proceedings of the Critical Infrastructure Protection XIII, 2019

2018
Variable Speed Simulation for Accelerated Industrial Control System Cyber Training.
Proceedings of the Critical Infrastructure Protection XII, 2018

2017
A cyber risk scoring system for medical devices.
Int. J. Crit. Infrastructure Prot., 2017

Improving the cyber resilience of industrial control systems.
Int. J. Crit. Infrastructure Prot., 2017

Categorization of Cyber Training Environments for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XI, 2017

Generating Honeypot Traffic for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XI, 2017

Multi-Controller Exercise Environments for Training Industrial Control System First Responders.
Proceedings of the Critical Infrastructure Protection XI, 2017

2016
Evaluating the readiness of cyber first responders responsible for critical infrastructure protection.
Int. J. Crit. Infrastructure Prot., 2016

Using timing-based side channels for anomaly detection in industrial control systems.
Int. J. Crit. Infrastructure Prot., 2016

2015
Constructing cost-effective and targetable industrial control system honeypots for production networks.
Int. J. Crit. Infrastructure Prot., 2015

2014
An evaluation of modification attacks on programmable logic controllers.
Int. J. Crit. Infrastructure Prot., 2014

Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices.
Int. J. Crit. Infrastructure Prot., 2014


  Loading...