Thomas H. Morris

Orcid: 0000-0002-4854-5419

Affiliations:
  • University of Alabama in Huntsville, USA


According to our database1, Thomas H. Morris authored at least 48 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators.
IEEE Internet Things J., 2023

2021
A Laboratory-Scale Canal SCADA System Testbed for Cybersecurity Research.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

2019
A Specification-Based Intrusion Prevention System for Malicious Payloads.
Proceedings of the National Cyber Summit, 2019

Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems.
Proceedings of the National Cyber Summit, 2019

Exploiting DRAM Latency Variations for Generating True Random Numbers.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

2018
Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event and Intrusion Classification.
IEEE Trans. Smart Grid, 2018

Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection.
IEEE Trans. Smart Grid, 2018

Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controllers.
IEEE Embed. Syst. Lett., 2018

OpenPLC: An IEC 61, 131-3 compliant open source industrial controller for cyber security research.
Comput. Secur., 2018

Virtualization of SCADA testbeds for cybersecurity research: A modular approach.
Comput. Secur., 2018

Modeling a Midstream Oil Terminal for Cyber Security Risk Evaluation.
Proceedings of the Critical Infrastructure Protection XII, 2018

Hardware-based Cyber Threats.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Study of hardware trojans based security vulnerabilities in cyber physical systems.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

2017
WAMS Cyber-Physical Test Bed for Power System, Cybersecurity Study, and Data Mining.
IEEE Trans. Smart Grid, 2017

INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research.
IEEE Secur. Priv., 2017

The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research.
CoRR, 2017

Securing SCADA Applications Using OpenPLC With End-To-End Encryption.
Proceedings of the 3rd Annual Industrial Control System Security Workshop, 2017

2016
Model-based autonomic security management for cyber-physical infrastructures.
Int. J. Crit. Infrastructures, 2016

Virtualization of Industrial Control System Testbeds for Cybersecurity.
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016

Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems.
IEEE Trans. Smart Grid, 2015

Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data.
IEEE Trans. Ind. Informatics, 2015

A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System.
Int. J. Netw. Secur., 2015

Enhancing a Virtual SCADA Laboratory Using Simulink.
Proceedings of the Critical Infrastructure Protection IX, 2015

2014
On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems.
J. Digit. Forensics Secur. Law, 2014

Industrial Control System Traffic Data Sets for Intrusion Detection Research.
Proceedings of the Critical Infrastructure Protection VIII, 2014

2013
Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information.
IEEE Trans. Smart Grid, 2013

Industrial Control System Cyber Attacks.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

Deterministic Intrusion Detection Rules for MODBUS Protocols.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Development & expansion of an industrial control system security laboratory and an international research collaboration.
Proceedings of the Cyber Security and Information Intelligence, 2013

Protocol mutation intrusion detection for synchrophasor communications.
Proceedings of the Cyber Security and Information Intelligence, 2013

Causal event graphs cyber-physical system intrusion detection system.
Proceedings of the Cyber Security and Information Intelligence, 2013

Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

2012
An open virtual testbed for industrial control system security research.
Int. J. Inf. Sec., 2012

Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems.
Int. J. Crit. Infrastructure Prot., 2012

Intrinsically Resilient Energy Control Systems.
Proceedings of the Seventh International Conference on Semantic Technologies for Intelligence, 2012

A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
A control system testbed to validate critical infrastructure protection concepts.
Int. J. Crit. Infrastructure Prot., 2011

A testbed for SCADA control system cybersecurity research and pedagogy.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Cybersecurity risk testing of substation phasor measurement units and phasor data concentrators.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Private computing on public platforms: portable application security.
Wirel. Commun. Mob. Comput., 2010

On SCADA control system command and response injection and intrusion detection.
Proceedings of the 2010 eCrime Researchers Summit, 2010

2009
Encryption Key Protection for Private Computing on Public Platforms.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Discovery, infiltration, and denial of service in a process control system wireless network.
Proceedings of the 2009 eCrime Researchers Summit, 2009

2008
Secure Context Switch for Private Computing on Public Platforms.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Privacy Protected ELF for Private Computing on Public Platforms.
Proceedings of the The Third International Conference on Availability, 2008

2007
PCPP: On Remote Host Assessment via Naive Bayesian Classification.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

1999
The evolution of a teledentistry system within the Department of Defense.
Proceedings of the AMIA 1999, 1999


  Loading...