116 results on '"Nicol, David"'
Search Results
2. Connectivity Preserving Anonymization of Smart Grid Network Configurations
3. Exploiting monotonicity and symmetry for efficient simulation of highly dependable systems
4. LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems.
5. Estimating Loss Due to Cyber-Attack in the Presence of Uncertainty
6. SDN Resiliency to Controller Failure in Mobile Contexts
7. Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure
8. F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid
9. Extensions of Network Reliability Analysis
10. ON REPEATABLE EMULATION IN VIRTUAL TESTBEDS
11. The Ransomware Threat to Energy-Delivery Systems.
12. The Value of Useless Academic Research to the Cyberdefense of Critical Infrastructures.
13. Network Coding for Critical Infrastructure Networks
14. Will Distributed Computing Revolutionize Peace? The Emergence of Battlefield IoT
15. Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs
16. Melody: Synthesized datasets for evaluating intrusion detection systems for the smart grid
17. Parallel discrete event simulation: The making of a field
18. Parallel discrete event simulation: The making of a field
19. Emulation/simulation of PLC networks with the S3F network simulator
20. I Am Joe's Fridge: Scalable Identity in the Internet of Things
21. Validating resiliency in Software Defined Networks for smart grids
22. Cyber-Physical models for power grid security analysis: 8-substation case
23. Toward an Internet of Battlefield Things: A Resilience Perspective.
24. Detection of x86 malware in AMI data payloads
25. Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios
26. A continuous piecewise-linear NHPP intensity function estimator
27. Modeling and analysis of stepping stone attacks
28. Automatic Generation of Security Argument Graphs
29. Denial-of-Service Threat to Hadoop/YARN Clusters with Multi-tenancy
30. Knowledge Discovery from Big Data for Intrusion Detection Using LDA
31. Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems
32. Impacts of application lookahead on distributed network emulation
33. Prevention of malware propagation in AMI
34. The Not-So-Smart Grid: Preliminary work on identifying vulnerabilities in ANSI C12.22
35. Validation of application behavior on a virtual time integrated network emulation testbed
36. Security and provenance in M3GS for cross-domain information sharing
37. Virtual Time Integration of Emulation and Parallel Simulation
38. Combating Unauthorized Load Signal Analysis with Targeted Event Masking
39. Scaling issues for NERC CIP electronic security perimeter compliance assessment (extended abstract)
40. S3F: The Scalable Simulation Framework revisited
41. A Virtual Time System for OpenVZ-Based Network Emulations
42. Fast simulation of background traffic through Fair Queueing networks
43. Methodologies for evaluating game theoretic defense against DDoS attacks
44. The Koobface botnet and the rise of social malware
45. Validation of Radio Channel Models Using an Anechoic Chamber
46. Efficient Gigabit Ethernet Switch Models for Large-Scale Simulation
47. Experiences Validating the Access Policy Tool in Industrial Settings
48. Acceleration of wireless channel simulation using GPUs
49. TrustGraph: Trusted Graphics Subsystem for High Assurance Systems
50. A post-disaster mobility model for Delay Tolerant Networking
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.