Stephen Dirk Bjørn Wolthusen
About
Competencies
Publications
2022
-
Nweke, Livinus Obiora;
Weldehawaryat, Goitom Kahsay;
Wolthusen, Stephen Dirk Bjørn.
(2022)
Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466)).
International Journal of Critical Infrastructure Protection.
volum 36.
Errata
2021
-
Nweke, Livinus Obiora;
Weldehawaryat, Goitom Kahsay;
Wolthusen, Stephen Dirk Bjørn.
(2021)
Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus.
International Journal of Critical Infrastructure Protection.
volum 35.
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2021)
A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda.
Lecture Notes in Networks and Systems.
volum 254.
Academic article
-
Yeng, Prosper;
Wolthusen, Stephen Dirk Bjørn;
Yang, Bian.
(2021)
Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring.
International Journal of Advanced Computer Science and Applications (IJACSA).
volum 12 (3).
Academic article
2020
-
Nweke, Livinus Obiora;
Weldehawaryat, Goitom Kahsay;
Wolthusen, Stephen.
(2020)
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols.
16th International Conference on the Design of Reliable Communication Networks DRCN 2020.
Academic chapter/article/Conference paper
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
A Review of Asset-Centric Threat Modelling Approaches.
International Journal of Advanced Computer Science and Applications (IJACSA).
volum 11 (2).
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection.
Wirtschaftsinformatik.
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection.
International Conference on Cyber Conflict, CYCON.
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model.
2020 IEEE Conference on Communications and Network Security (CNS).
Academic chapter/article/Conference paper
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Resilience Analysis of Software-Defined Networks Using Queueing Networks.
2020 International Conference on Computing, Networking and Communications (ICNC).
Academic chapter/article/Conference paper
-
Nweke, Livinus Obiora;
Yeng, Prosper;
Wolthusen, Stephen;
Yang, Bian.
(2020)
Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices.
International Journal of Advanced Computer Science and Applications (IJACSA).
volum 11 (2).
Academic article
-
Yeng, Prosper;
Wolthusen, Stephen Dirk Bjørn;
Yang, Bian.
(2020)
Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice.
International Journal of Advanced Computer Science and Applications (IJACSA).
volum 11 (11).
Academic article
-
Yeng, Prosper;
Wolthusen, Stephen Dirk Bjørn;
Yang, Bian.
(2020)
Legal requirements toward enhancing the security of medical devices.
International Journal of Advanced Computer Science and Applications (IJACSA).
volum 11 (11).
Academic literature review
2019
-
Gul, Ammara;
Wolthusen, Stephen.
(2019)
In-cycle sequential topology faults and attacks: Effects on state estimation.
Lecture Notes in Computer Science (LNCS).
volum 11260 LNCS.
Academic article
-
Kavallieratos, Georgios;
Chowdhury, Nabin;
Katsikas, Sokratis;
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2019)
Threat Analysis for Smart Homes.
Future Internet.
volum 11 (10).
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen;
Mancini, Luigi V..
(2019)
A Framework for the Validation of Network Artifacts.
Norsk Informasjonssikkerhetskonferanse (NISK).
volum 12.
Academic article
2018
-
Wright, James G;
Wolthusen, Stephen.
(2018)
De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol.
Lecture Notes in Computer Science (LNCS).
volum 10707 LNCS.
Academic article
-
Baiocco, Alessio;
Wolthusen, Stephen.
(2018)
Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol.
IEEE Power & Energy Society General Meeting.
Academic article
-
Darwish, Salaheddin;
Nouretdinov, Ilia;
Wolthusen, Stephen.
(2018)
A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements.
Lecture Notes in Computer Science (LNCS).
volum 10898 LNCS.
Academic article
-
Gul, Ammara;
Wolthusen, Stephen.
(2018)
Error propagation after reordering attacks on hierarchical state estimation.
IFIP Advances in Information and Communication Technology.
volum 542.
Academic article
2017
-
Alcaraz, Cristina;
Lopez, Javier;
Wolthusen, Stephen.
(2017)
OCPP Protocol: Security Threats and Challenges.
IEEE Transactions on Smart Grid.
volum 8 (5).
Academic article
-
Ambassa, Pacome L.;
Wolthusen, Stephen;
Kayem, Anne V.D.M.;
Meinel, Christoph.
(2017)
Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids.
Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers.
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Risthein, Erko;
Wolthusen, Stephen.
(2017)
TACTICS: Validation of the security framework developed for tactical SOA.
Journal of Information Security and Applications.
volum 35.
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
A Security Policy Infrastructure for Tactical Service Oriented Architectures.
Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers.
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures.
Advances in Intelligent Systems and Computing.
volum 461.
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017.
Advances in Intelligent Systems and Computing.
volum 611.
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
Security Requirements for the Deployment of Services Across Tactical SOA.
Lecture Notes in Computer Science (LNCS).
volum 10446 LNCS.
Academic article
-
Kayem, Anne V.D.M.;
Meinel, Christoph;
Wolthusen, Stephen.
(2017)
A smart micro-grid architecture for resource constrained environments.
Advanced Information Networking and Applications.
Academic article
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2017)
Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids.
2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
Academic chapter/article/Conference paper
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2017)
Power auctioning in resource constrained micro-grids: Cases of cheating.
Lecture Notes in Computer Science (LNCS).
volum 10242 LNCS.
Academic article
-
Rigolin Ferreira Lopes, Roberto;
Nieminen, Mikko;
Viidanoja, Antti;
Wolthusen, Stephen.
(2017)
Reactive/Proactive Connectivity Management in a Tactical Service-Oriented Infrastructure.
2017 International Conference on Military Communications and Information Systems (ICMCIS); May 15-16, 2017; Oulu, Finland.
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom Kahsay;
Ambassa, Pacome L.;
Marufu, Anesu M.C.;
Wolthusen, Stephen;
Kayem, Anne V.D.M..
(2017)
Decentralised scheduling of power consumption in micro-grids: Optimisation and security.
Lecture Notes in Computer Science (LNCS).
volum 10166 LNCS.
Academic article
-
Wright, James G;
Wolthusen, Stephen.
(2017)
Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol.
Lecture Notes in Computer Science (LNCS).
volum 10242 LNCS.
Academic article
2016
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2016)
MPLS Policy Target Recognition Network.
Lecture Notes in Computer Science (LNCS).
volum 9572.
Academic article
-
Alcaraz, Cristina;
Lopeza, Javier;
Wolthusen, Stephen.
(2016)
Policy enforcement system for secure interoperable control in distributed Smart Grid systems.
Journal of Network and Computer Applications.
volum 59.
Academic article
-
Almulla, Sameera;
Iraqi, Youssef;
Wolthusen, Stephen.
(2016)
Inferring relevance and presence of evidence in service-oriented and SaaS architectures.
Proceedings of the IEEE Symposium on Computers and Communications.
volum 2016-February.
Academic article
-
Alwasel, Bader;
Wolthusen, Stephen.
(2016)
Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes.
Lecture Notes in Computer Science (LNCS).
volum 9578.
Academic article
-
Alwasel, Bader;
Wolthusen, Stephen.
(2016)
Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use.
Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers.
Academic chapter/article/Conference paper
-
Ambassa, Pacome L.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen;
Meinel, Cristoph.
(2016)
Privacy Violations in Constrained Micro-grids: Adversarial Cases.
Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016.
Academic chapter/article/Conference paper
-
Baiocco, Alessio;
Foglietta, Chiara;
Wolthusen, Stephen.
(2016)
Delay and Jitter Attacks on Hierarchical State Estimation.
2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2016)
Efficient security policy reconciliation in tactical service oriented architectures.
Communications in Computer and Information Science.
volum 670.
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen D..
(2016)
Securing tactical service oriented architectures.
2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC).
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen;
Flizikowski, Adam;
Stachowicz, Anna;
Nogalski, Dariusz;
Gleba, Kamil;
Sliwa, Joanna.
(2016)
Interoperability of security and quality of Service Policies Over Tactical SOA.
Proc. of 2016 IEEE Symposium Series on Computational Intelligence (SSCI).
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen;
Iossifides, Athanasios.
(2016)
A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE).
Norsk Informasjonssikkerhetskonferanse (NISK).
volum 2016.
Academic article
-
Kayem, Anne;
Strauss, Heinrich;
Wolthusen, Stephen D.;
Meinel, Christoph.
(2016)
Key Management for Secure Demand Data Communication in Constrained Micro-grids.
2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA).
Academic chapter/article/Conference paper
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2016)
A distributed continuous double auction framework for resource constrained microgrids.
Lecture Notes in Computer Science (LNCS).
volum 9578.
Academic article
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2016)
Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2016)
An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms.
Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers.
Academic chapter/article/Conference paper
2015
-
Alcaraz, Cristina;
Miciolino, Estefanía Etchevés;
Wolthusen, Stephen.
(2015)
Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs.
Information Security; 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings.
Academic chapter/article/Conference paper
-
Alwasel, Bader;
Wolthusen, Stephen.
(2015)
Structural Controllability Analysis via Embedding Power Dominating Set Approximation in Erd˝os-R´enyi Graphs.
WAINA2015, IEEE 29th International Conference on Advanced Information Networking and Applications Workshops; 25-27 March 2015, Gwangju, Korea.
Academic chapter/article/Conference paper
-
Ambassa, Pacome L.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen;
Meinel, Christoph.
(2015)
Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids.
Future Network Systems and Security: First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings.
Academic chapter/article/Conference paper
-
Ambassa, Pacome L.;
Wolthusen, Stephen;
Kayem, Anne V.D.M.;
Meinel, Christoph.
(2015)
Robust Snapshot Algorithm for Power Consumption Monitoring in Computationally Constrained Micro-Grids.
2015 IEEE Innovative Smart Grid Technologies - Asia Conference Proceedings.
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2015)
Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks.
Norsk Informasjonssikkerhetskonferanse (NISK).
Academic article
-
Lopes, Roberto Rigolin Ferreira;
Wolthusen, Stephen.
(2015)
Distributed Security Policies for Service-Oriented Architectures over Tactical Networks.
Military Communications Conference, MILCOM 2015; October 26-28, 2015 Tampa, USA.
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2015)
Modelling Interdependencies over Incomplete Join Structures of Power Law Networks.
2015 11th International Conference on the Design of Reliable Communication Networks (DRCN).
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2015)
Secure distributed demand projection in micro-grids.
2015 Global Information Infrastructure and Networking Symposium (GIIS 2015) Guadalajara, Mexico 28 – 30 October 2015 - Proceedings.
Academic chapter/article/Conference paper
2014
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2014)
A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models.
Information Security in Diverse Computing Environments.
Academic chapter/article/Conference paper
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2014)
Malicious MPLS Policy Engine Reconnaissance.
Communications and Multimedia Security; 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings.
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2014)
Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems.
Communications and Multimedia Security; 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings.
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2014)
Mitigation of Cloud-Internal Denial of Service Attacks.
IEEE Eighth International Symposium on Service Oriented System Engineering, SOSE 2014; 7–11 April 2014 Oxford, United Kingdom.
Academic chapter/article/Conference paper
-
Alcaraz, Cristina;
Wolthusen, Stephen.
(2014)
Recovery of Structural Controllability for Control Systems.
Critical Infrastructure Protection VIII; 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers.
Academic chapter/article/Conference paper
-
Alwasel, Bader;
Wolthusen, Stephen.
(2014)
Reconstruction of Structural Controllability over Erd˝os-Rényi Graphs via Power Dominating Sets.
Proceedings of the 9th Annual Cyber and Information Security Research Conference, CISR 14; April 08 - 10, 2014, Oak Ridge, USA.
Academic chapter/article/Conference paper
-
Baiocco, Alessio;
Wolthusen, Stephen.
(2014)
Stability of Power Network State Estimation Under Attack.
IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA).
Academic chapter/article/Conference paper
-
Baiocco, Alessio;
Wolthusen, Stephen;
Foglietta, Chiara;
Panzieri, Stefano.
(2014)
A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation.
The Fifth Conference on Innovative Smart Grid Technologies, ISGT 2014; February 19-22, 2014, Washington Grand Hyatt, USA.
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2014)
Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.
Critical Infrastructure Protection VIII; 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers.
Academic chapter/article/Conference paper
2013
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2013)
An Analysis of Service Degradation Attacks against Real-Time MPLS Networks.
2013 Information security for South Africa; Proceedings of the ISSA 2013 Conference; 14 – 16 August 2013; Johannesburg, South Africa.
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2013)
Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines.
Network and System Security, 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings.
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2013)
Robust Coordination of Cloud-Internal Denial of Service Attacks.
Proceedings of IEEE Third International Conference on Cloud and Green Computing (CGC 2013) and IEEE Third International Conference on Social Computing and Its Applications (SCA 2013); 30 September – 2 October 2013, Karlsruhe, Germany.
Academic chapter/article/Conference paper
-
Alcaraz, Cristina;
Miciolino, Estefanía Etchevés;
Wolthusen, Stephen.
(2013)
Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal.
Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers.
Academic chapter/article/Conference paper
-
Bologna, Sandro;
Hämmerli, Bernhard Markus;
Gritzalis, Dimitris;
Wolthusen, Stephen.
(2013)
Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers.
Springer. 2013. ISBN 978-3-642-41476-3. Lecture Notes in Computer Science (6983).
Academic anthology/Conference proceedings
-
Feng, Yangyue;
Foglietta, Chiara;
Baiocco, Alessio;
Panzieri, Stefano;
Wolthusen, Stephen.
(2013)
Malicious false data injection in hierarchical electric power grid state estimation systems.
e-Energy’13, Proceedings of the fourth international conference on Future energy systems.
Academic chapter/article/Conference paper
-
Franke, Katrin;
Hjelmås, Erik;
Wolthusen, Stephen.
(2013)
Advancing Digital Forensics.
Information Assurance and Security Education and Training.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2013)
Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures.
Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2013)
Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation.
Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2013)
Locating subverted processes using random packet comparison in SCADA systems.
International Journal of Critical Infrastructures.
volum 9 (1/2).
Academic article
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2013)
Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs.
Proceedings of the IEEE 2nd International Network Science Workshop (NSW); West Point, NY, USA, April 29 2013-May 1 2013.
Academic chapter/article/Conference paper
-
Weston, Peter;
Wolthusen, Stephen.
(2013)
Forensic Entropy Analysis of Microsoft Windows Storage Volumes.
2013 Information security for South Africa; Proceedings of the ISSA 2013 Conference; 14 – 16 August 2013; Johannesburg, South Africa.
Academic chapter/article/Conference paper
2012
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2012)
Algorithmic approach for clandestine localisation and tracking in short-range environments.
International Journal of Communication Networks and Distributed Systems.
volum 9 (3/4).
Academic article
-
Lopez, Javier;
Setola, Roberto;
Wolthusen, Stephen.
(2012)
Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense.
Springer. 2012. ISBN 9783642289194. Lecture Notes in Computer Science (7130).
Academic anthology/Conference proceedings
-
Lopez, Javier;
Setola, Roberto;
Wolthusen, Stephen.
(2012)
Overview of Critical Information Infrastructure Protection.
Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense.
Academic chapter/article/Conference paper
-
Seeger, Mark M.;
Wolthusen, Stephen.
(2012)
Towards Concurrent Data Sampling Using GPU Coprocessing.
Proceedings of the Seventh International Conference on Availability, Reliability and Security, ARES 2012; 20-24 August 2012; Prague, Czech Republic.
Academic chapter/article/Conference paper
-
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2012)
Modelling Approaches.
Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense.
Academic chapter/article/Conference paper
2011
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2011)
On the feasibility of carrying out live real-time forensics for modern intelligent vehicles.
Forensics in telecommunications, information, and multimedia : third international ICST conference, e-forensics 2010, Shanghai, China, November 11-12, 2010, revised selected papers.
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2011)
A Propagation Model of A Vulnerability Mitigation Computer Worm – Seawave.
5th International Conference on Network and System Security; Milan, Italy, September 6-8, 2011.
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2011)
Threat Analysis Model of an Agent-Based Vulnerability Mitigation Mechanism Using Bayesian Belief Networks.
2011 IEEE, Network Science Workshop (NSW).
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2011)
A Formal Adversary Capability Model for SCADA Environments.
Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers.
Academic chapter/article/Conference paper
-
Reidt, Steffen;
Ebinger, Peter;
Kuijper, Arjan;
Wolthusen, Stephen.
(2011)
Resource-Constrained Signal Propagation Modeling for Tactical Mobile Ad Hoc Networks.
2011 IEEE, Network Science Workshop (NSW).
Academic chapter/article/Conference paper
-
Xenakis, Christos;
Wolthusen, Stephen.
(2011)
Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers.
Springer. 2011. ISBN 978-3-642-21693-0. Lecture Notes in Computer Science (6712).
Academic anthology/Conference proceedings
2010
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks.
Digital Forensics and Cyber Crime.
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks.
Security and Privacy in Mobile Information and Communication Systems.
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
Forensic Tracking and Mobility Prediction in Vehicular Networks.
Advances in Digital Forensics VI.
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion.
Communications and Multimedia Security.
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2010)
Agent-based host enumeration and vulnerability scanning using dynamic topology information.
2010, Information Security for South Africa (ISSA), Proceedings of the ISSA 2010 Conference.
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2010)
Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism.
Proceedings of the Fifth International Conference on Avaliability, Reliability and Security: ARES 2010.
Academic chapter/article/Conference paper
-
Lunden, Nils;
Sveen, Robin;
Lund, Hans;
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2010)
Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments.
Critical Infrastructure Protection IV.
Academic chapter/article/Conference paper
-
Mairaj, Danish;
Wolthusen, Stephen;
Busch, Christoph.
(2010)
Teeth Segmentation and Feature Extraction for Odontological Biometrics.
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on - 15-17 Oct. 2010.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems.
The Fifth International Conference on Systems ICONS 2010 : 11-16 April 2010 Menuires, France.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes.
Critical Infrastructure Protection IV.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
Host-Based Security Sensor Integrity in Multiprocessing Environments.
Information Security, Practice and Experience.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
Trouble Brewing: Using Observations of Invariant Behavior to Detect.
Critical Information Infrastructures Security.
Academic chapter/article/Conference paper
-
Riedmüller, Reinhard;
Seeger, Mark M.;
Baier, Harald;
Busch, Christoph;
Wolthusen, Stephen.
(2010)
Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection.
2nd International Workshop On Security and Communication networks (IWSCN), May 26-28, 2010, Karlstad, Sweden.
Academic chapter/article/Conference paper
-
Seeger, Mark M.;
Wolthusen, Stephen.
(2010)
Observation mechanism and cost model for tightly coupled asymmetric concurrency.
The Fifth International Conference on Systems ICONS 2010 : 11-16 April 2010 Menuires, France.
Academic chapter/article/Conference paper
2009
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2009)
Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination.
IMF '09. Fifth International Conference on IT Security Incident Management and IT Forensics, 2009.
Academic chapter/article/Conference paper
-
Borgen, Halvor;
Bours, Patrick;
Wolthusen, Stephen.
(2009)
Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance.
Advances in Biometrics.
Academic chapter/article/Conference paper
-
Busch, Christoph;
Wolthusen, Stephen.
(2009)
Non-Forensic Odontological Biometrics.
IIH-MSP '09. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009.
Academic chapter/article/Conference paper
-
Ebinger, Peter;
Wolthusen, Stephen.
(2009)
Efficient state estimation and Byzantine behavior identification in Tactical MANETs.
Proceedings of the Military Communications Conference, MILCOM 2009.
Academic chapter/article/Conference paper
-
Reidt, Steffen;
Wolthusen, Stephen.
(2009)
Energy-efficient key distribution and revocation in tactical networks with asymmetric links.
Proceedings of the Military Communications Conference, MILCOM 2009.
Academic chapter/article/Conference paper
-
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2009)
Modeling And Detecting Anomalies In Scada Systems.
Critical Infrastructure Protection II.
Academic chapter/article/Conference paper
-
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2009)
Using Physical Models for Anomaly Detection in Control Systems.
Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009.
Academic chapter/article/Conference paper
-
Wolthusen, Stephen.
(2009)
Overcast: Forensic Discovery in Cloud Environments.
IMF '09. Fifth International Conference on IT Security Incident Management and IT Forensics, 2009.
Academic chapter/article/Conference paper
-
Zhou, Xuebing;
Wolthusen, Stephen;
Busch, Christoph;
Kuijper, Arjan.
(2009)
A Security Analysis of Biometric Template Protection Schemes.
Image Analysis and Recognition.
Academic chapter/article/Conference paper
-
Zhou, Xuebing;
Wolthusen, Stephen;
Busch, Christoph;
Kuijper, Arjan.
(2009)
Feature Correlation Attack on Biometric Privacy Protection Schemes.
IIH-MSP '09. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009.
Academic chapter/article/Conference paper
Journal publications
-
Nweke, Livinus Obiora;
Weldehawaryat, Goitom Kahsay;
Wolthusen, Stephen Dirk Bjørn.
(2022)
Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466)).
International Journal of Critical Infrastructure Protection.
volum 36.
Errata
-
Nweke, Livinus Obiora;
Weldehawaryat, Goitom Kahsay;
Wolthusen, Stephen Dirk Bjørn.
(2021)
Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus.
International Journal of Critical Infrastructure Protection.
volum 35.
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2021)
A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda.
Lecture Notes in Networks and Systems.
volum 254.
Academic article
-
Yeng, Prosper;
Wolthusen, Stephen Dirk Bjørn;
Yang, Bian.
(2021)
Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring.
International Journal of Advanced Computer Science and Applications (IJACSA).
volum 12 (3).
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
A Review of Asset-Centric Threat Modelling Approaches.
International Journal of Advanced Computer Science and Applications (IJACSA).
volum 11 (2).
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection.
Wirtschaftsinformatik.
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection.
International Conference on Cyber Conflict, CYCON.
Academic article
-
Nweke, Livinus Obiora;
Yeng, Prosper;
Wolthusen, Stephen;
Yang, Bian.
(2020)
Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices.
International Journal of Advanced Computer Science and Applications (IJACSA).
volum 11 (2).
Academic article
-
Yeng, Prosper;
Wolthusen, Stephen Dirk Bjørn;
Yang, Bian.
(2020)
Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice.
International Journal of Advanced Computer Science and Applications (IJACSA).
volum 11 (11).
Academic article
-
Yeng, Prosper;
Wolthusen, Stephen Dirk Bjørn;
Yang, Bian.
(2020)
Legal requirements toward enhancing the security of medical devices.
International Journal of Advanced Computer Science and Applications (IJACSA).
volum 11 (11).
Academic literature review
-
Gul, Ammara;
Wolthusen, Stephen.
(2019)
In-cycle sequential topology faults and attacks: Effects on state estimation.
Lecture Notes in Computer Science (LNCS).
volum 11260 LNCS.
Academic article
-
Kavallieratos, Georgios;
Chowdhury, Nabin;
Katsikas, Sokratis;
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2019)
Threat Analysis for Smart Homes.
Future Internet.
volum 11 (10).
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen;
Mancini, Luigi V..
(2019)
A Framework for the Validation of Network Artifacts.
Norsk Informasjonssikkerhetskonferanse (NISK).
volum 12.
Academic article
-
Wright, James G;
Wolthusen, Stephen.
(2018)
De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol.
Lecture Notes in Computer Science (LNCS).
volum 10707 LNCS.
Academic article
-
Baiocco, Alessio;
Wolthusen, Stephen.
(2018)
Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol.
IEEE Power & Energy Society General Meeting.
Academic article
-
Darwish, Salaheddin;
Nouretdinov, Ilia;
Wolthusen, Stephen.
(2018)
A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements.
Lecture Notes in Computer Science (LNCS).
volum 10898 LNCS.
Academic article
-
Gul, Ammara;
Wolthusen, Stephen.
(2018)
Error propagation after reordering attacks on hierarchical state estimation.
IFIP Advances in Information and Communication Technology.
volum 542.
Academic article
-
Alcaraz, Cristina;
Lopez, Javier;
Wolthusen, Stephen.
(2017)
OCPP Protocol: Security Threats and Challenges.
IEEE Transactions on Smart Grid.
volum 8 (5).
Academic article
-
Gkioulos, Vasileios;
Risthein, Erko;
Wolthusen, Stephen.
(2017)
TACTICS: Validation of the security framework developed for tactical SOA.
Journal of Information Security and Applications.
volum 35.
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures.
Advances in Intelligent Systems and Computing.
volum 461.
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017.
Advances in Intelligent Systems and Computing.
volum 611.
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
Security Requirements for the Deployment of Services Across Tactical SOA.
Lecture Notes in Computer Science (LNCS).
volum 10446 LNCS.
Academic article
-
Kayem, Anne V.D.M.;
Meinel, Christoph;
Wolthusen, Stephen.
(2017)
A smart micro-grid architecture for resource constrained environments.
Advanced Information Networking and Applications.
Academic article
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2017)
Power auctioning in resource constrained micro-grids: Cases of cheating.
Lecture Notes in Computer Science (LNCS).
volum 10242 LNCS.
Academic article
-
Weldehawaryat, Goitom Kahsay;
Ambassa, Pacome L.;
Marufu, Anesu M.C.;
Wolthusen, Stephen;
Kayem, Anne V.D.M..
(2017)
Decentralised scheduling of power consumption in micro-grids: Optimisation and security.
Lecture Notes in Computer Science (LNCS).
volum 10166 LNCS.
Academic article
-
Wright, James G;
Wolthusen, Stephen.
(2017)
Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol.
Lecture Notes in Computer Science (LNCS).
volum 10242 LNCS.
Academic article
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2016)
MPLS Policy Target Recognition Network.
Lecture Notes in Computer Science (LNCS).
volum 9572.
Academic article
-
Alcaraz, Cristina;
Lopeza, Javier;
Wolthusen, Stephen.
(2016)
Policy enforcement system for secure interoperable control in distributed Smart Grid systems.
Journal of Network and Computer Applications.
volum 59.
Academic article
-
Almulla, Sameera;
Iraqi, Youssef;
Wolthusen, Stephen.
(2016)
Inferring relevance and presence of evidence in service-oriented and SaaS architectures.
Proceedings of the IEEE Symposium on Computers and Communications.
volum 2016-February.
Academic article
-
Alwasel, Bader;
Wolthusen, Stephen.
(2016)
Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes.
Lecture Notes in Computer Science (LNCS).
volum 9578.
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2016)
Efficient security policy reconciliation in tactical service oriented architectures.
Communications in Computer and Information Science.
volum 670.
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen;
Iossifides, Athanasios.
(2016)
A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE).
Norsk Informasjonssikkerhetskonferanse (NISK).
volum 2016.
Academic article
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2016)
A distributed continuous double auction framework for resource constrained microgrids.
Lecture Notes in Computer Science (LNCS).
volum 9578.
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2015)
Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks.
Norsk Informasjonssikkerhetskonferanse (NISK).
Academic article
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2013)
Locating subverted processes using random packet comparison in SCADA systems.
International Journal of Critical Infrastructures.
volum 9 (1/2).
Academic article
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2012)
Algorithmic approach for clandestine localisation and tracking in short-range environments.
International Journal of Communication Networks and Distributed Systems.
volum 9 (3/4).
Academic article
Books
-
Bologna, Sandro;
Hämmerli, Bernhard Markus;
Gritzalis, Dimitris;
Wolthusen, Stephen.
(2013)
Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers.
Springer. 2013. ISBN 978-3-642-41476-3. Lecture Notes in Computer Science (6983).
Academic anthology/Conference proceedings
-
Lopez, Javier;
Setola, Roberto;
Wolthusen, Stephen.
(2012)
Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense.
Springer. 2012. ISBN 9783642289194. Lecture Notes in Computer Science (7130).
Academic anthology/Conference proceedings
-
Xenakis, Christos;
Wolthusen, Stephen.
(2011)
Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers.
Springer. 2011. ISBN 978-3-642-21693-0. Lecture Notes in Computer Science (6712).
Academic anthology/Conference proceedings
Part of book/report
-
Nweke, Livinus Obiora;
Weldehawaryat, Goitom Kahsay;
Wolthusen, Stephen.
(2020)
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols.
16th International Conference on the Design of Reliable Communication Networks DRCN 2020.
Academic chapter/article/Conference paper
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model.
2020 IEEE Conference on Communications and Network Security (CNS).
Academic chapter/article/Conference paper
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Resilience Analysis of Software-Defined Networks Using Queueing Networks.
2020 International Conference on Computing, Networking and Communications (ICNC).
Academic chapter/article/Conference paper
-
Ambassa, Pacome L.;
Wolthusen, Stephen;
Kayem, Anne V.D.M.;
Meinel, Christoph.
(2017)
Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids.
Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers.
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
A Security Policy Infrastructure for Tactical Service Oriented Architectures.
Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers.
Academic chapter/article/Conference paper
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2017)
Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids.
2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
Academic chapter/article/Conference paper
-
Rigolin Ferreira Lopes, Roberto;
Nieminen, Mikko;
Viidanoja, Antti;
Wolthusen, Stephen.
(2017)
Reactive/Proactive Connectivity Management in a Tactical Service-Oriented Infrastructure.
2017 International Conference on Military Communications and Information Systems (ICMCIS); May 15-16, 2017; Oulu, Finland.
Academic chapter/article/Conference paper
-
Alwasel, Bader;
Wolthusen, Stephen.
(2016)
Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use.
Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers.
Academic chapter/article/Conference paper
-
Ambassa, Pacome L.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen;
Meinel, Cristoph.
(2016)
Privacy Violations in Constrained Micro-grids: Adversarial Cases.
Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016.
Academic chapter/article/Conference paper
-
Baiocco, Alessio;
Foglietta, Chiara;
Wolthusen, Stephen.
(2016)
Delay and Jitter Attacks on Hierarchical State Estimation.
2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen D..
(2016)
Securing tactical service oriented architectures.
2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC).
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen;
Flizikowski, Adam;
Stachowicz, Anna;
Nogalski, Dariusz;
Gleba, Kamil;
Sliwa, Joanna.
(2016)
Interoperability of security and quality of Service Policies Over Tactical SOA.
Proc. of 2016 IEEE Symposium Series on Computational Intelligence (SSCI).
Academic chapter/article/Conference paper
-
Kayem, Anne;
Strauss, Heinrich;
Wolthusen, Stephen D.;
Meinel, Christoph.
(2016)
Key Management for Secure Demand Data Communication in Constrained Micro-grids.
2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA).
Academic chapter/article/Conference paper
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2016)
Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2016)
An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms.
Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers.
Academic chapter/article/Conference paper
-
Alcaraz, Cristina;
Miciolino, Estefanía Etchevés;
Wolthusen, Stephen.
(2015)
Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs.
Information Security; 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings.
Academic chapter/article/Conference paper
-
Alwasel, Bader;
Wolthusen, Stephen.
(2015)
Structural Controllability Analysis via Embedding Power Dominating Set Approximation in Erd˝os-R´enyi Graphs.
WAINA2015, IEEE 29th International Conference on Advanced Information Networking and Applications Workshops; 25-27 March 2015, Gwangju, Korea.
Academic chapter/article/Conference paper
-
Ambassa, Pacome L.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen;
Meinel, Christoph.
(2015)
Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids.
Future Network Systems and Security: First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings.
Academic chapter/article/Conference paper
-
Ambassa, Pacome L.;
Wolthusen, Stephen;
Kayem, Anne V.D.M.;
Meinel, Christoph.
(2015)
Robust Snapshot Algorithm for Power Consumption Monitoring in Computationally Constrained Micro-Grids.
2015 IEEE Innovative Smart Grid Technologies - Asia Conference Proceedings.
Academic chapter/article/Conference paper
-
Lopes, Roberto Rigolin Ferreira;
Wolthusen, Stephen.
(2015)
Distributed Security Policies for Service-Oriented Architectures over Tactical Networks.
Military Communications Conference, MILCOM 2015; October 26-28, 2015 Tampa, USA.
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2015)
Modelling Interdependencies over Incomplete Join Structures of Power Law Networks.
2015 11th International Conference on the Design of Reliable Communication Networks (DRCN).
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2015)
Secure distributed demand projection in micro-grids.
2015 Global Information Infrastructure and Networking Symposium (GIIS 2015) Guadalajara, Mexico 28 – 30 October 2015 - Proceedings.
Academic chapter/article/Conference paper
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2014)
A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models.
Information Security in Diverse Computing Environments.
Academic chapter/article/Conference paper
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2014)
Malicious MPLS Policy Engine Reconnaissance.
Communications and Multimedia Security; 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings.
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2014)
Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems.
Communications and Multimedia Security; 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings.
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2014)
Mitigation of Cloud-Internal Denial of Service Attacks.
IEEE Eighth International Symposium on Service Oriented System Engineering, SOSE 2014; 7–11 April 2014 Oxford, United Kingdom.
Academic chapter/article/Conference paper
-
Alcaraz, Cristina;
Wolthusen, Stephen.
(2014)
Recovery of Structural Controllability for Control Systems.
Critical Infrastructure Protection VIII; 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers.
Academic chapter/article/Conference paper
-
Alwasel, Bader;
Wolthusen, Stephen.
(2014)
Reconstruction of Structural Controllability over Erd˝os-Rényi Graphs via Power Dominating Sets.
Proceedings of the 9th Annual Cyber and Information Security Research Conference, CISR 14; April 08 - 10, 2014, Oak Ridge, USA.
Academic chapter/article/Conference paper
-
Baiocco, Alessio;
Wolthusen, Stephen.
(2014)
Stability of Power Network State Estimation Under Attack.
IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA).
Academic chapter/article/Conference paper
-
Baiocco, Alessio;
Wolthusen, Stephen;
Foglietta, Chiara;
Panzieri, Stefano.
(2014)
A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation.
The Fifth Conference on Innovative Smart Grid Technologies, ISGT 2014; February 19-22, 2014, Washington Grand Hyatt, USA.
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2014)
Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.
Critical Infrastructure Protection VIII; 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers.
Academic chapter/article/Conference paper
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2013)
An Analysis of Service Degradation Attacks against Real-Time MPLS Networks.
2013 Information security for South Africa; Proceedings of the ISSA 2013 Conference; 14 – 16 August 2013; Johannesburg, South Africa.
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2013)
Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines.
Network and System Security, 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings.
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2013)
Robust Coordination of Cloud-Internal Denial of Service Attacks.
Proceedings of IEEE Third International Conference on Cloud and Green Computing (CGC 2013) and IEEE Third International Conference on Social Computing and Its Applications (SCA 2013); 30 September – 2 October 2013, Karlsruhe, Germany.
Academic chapter/article/Conference paper
-
Alcaraz, Cristina;
Miciolino, Estefanía Etchevés;
Wolthusen, Stephen.
(2013)
Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal.
Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers.
Academic chapter/article/Conference paper
-
Feng, Yangyue;
Foglietta, Chiara;
Baiocco, Alessio;
Panzieri, Stefano;
Wolthusen, Stephen.
(2013)
Malicious false data injection in hierarchical electric power grid state estimation systems.
e-Energy’13, Proceedings of the fourth international conference on Future energy systems.
Academic chapter/article/Conference paper
-
Franke, Katrin;
Hjelmås, Erik;
Wolthusen, Stephen.
(2013)
Advancing Digital Forensics.
Information Assurance and Security Education and Training.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2013)
Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures.
Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2013)
Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation.
Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers.
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2013)
Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs.
Proceedings of the IEEE 2nd International Network Science Workshop (NSW); West Point, NY, USA, April 29 2013-May 1 2013.
Academic chapter/article/Conference paper
-
Weston, Peter;
Wolthusen, Stephen.
(2013)
Forensic Entropy Analysis of Microsoft Windows Storage Volumes.
2013 Information security for South Africa; Proceedings of the ISSA 2013 Conference; 14 – 16 August 2013; Johannesburg, South Africa.
Academic chapter/article/Conference paper
-
Lopez, Javier;
Setola, Roberto;
Wolthusen, Stephen.
(2012)
Overview of Critical Information Infrastructure Protection.
Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense.
Academic chapter/article/Conference paper
-
Seeger, Mark M.;
Wolthusen, Stephen.
(2012)
Towards Concurrent Data Sampling Using GPU Coprocessing.
Proceedings of the Seventh International Conference on Availability, Reliability and Security, ARES 2012; 20-24 August 2012; Prague, Czech Republic.
Academic chapter/article/Conference paper
-
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2012)
Modelling Approaches.
Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense.
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2011)
On the feasibility of carrying out live real-time forensics for modern intelligent vehicles.
Forensics in telecommunications, information, and multimedia : third international ICST conference, e-forensics 2010, Shanghai, China, November 11-12, 2010, revised selected papers.
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2011)
A Propagation Model of A Vulnerability Mitigation Computer Worm – Seawave.
5th International Conference on Network and System Security; Milan, Italy, September 6-8, 2011.
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2011)
Threat Analysis Model of an Agent-Based Vulnerability Mitigation Mechanism Using Bayesian Belief Networks.
2011 IEEE, Network Science Workshop (NSW).
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2011)
A Formal Adversary Capability Model for SCADA Environments.
Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers.
Academic chapter/article/Conference paper
-
Reidt, Steffen;
Ebinger, Peter;
Kuijper, Arjan;
Wolthusen, Stephen.
(2011)
Resource-Constrained Signal Propagation Modeling for Tactical Mobile Ad Hoc Networks.
2011 IEEE, Network Science Workshop (NSW).
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks.
Digital Forensics and Cyber Crime.
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks.
Security and Privacy in Mobile Information and Communication Systems.
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
Forensic Tracking and Mobility Prediction in Vehicular Networks.
Advances in Digital Forensics VI.
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion.
Communications and Multimedia Security.
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2010)
Agent-based host enumeration and vulnerability scanning using dynamic topology information.
2010, Information Security for South Africa (ISSA), Proceedings of the ISSA 2010 Conference.
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2010)
Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism.
Proceedings of the Fifth International Conference on Avaliability, Reliability and Security: ARES 2010.
Academic chapter/article/Conference paper
-
Lunden, Nils;
Sveen, Robin;
Lund, Hans;
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2010)
Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments.
Critical Infrastructure Protection IV.
Academic chapter/article/Conference paper
-
Mairaj, Danish;
Wolthusen, Stephen;
Busch, Christoph.
(2010)
Teeth Segmentation and Feature Extraction for Odontological Biometrics.
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on - 15-17 Oct. 2010.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems.
The Fifth International Conference on Systems ICONS 2010 : 11-16 April 2010 Menuires, France.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes.
Critical Infrastructure Protection IV.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
Host-Based Security Sensor Integrity in Multiprocessing Environments.
Information Security, Practice and Experience.
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
Trouble Brewing: Using Observations of Invariant Behavior to Detect.
Critical Information Infrastructures Security.
Academic chapter/article/Conference paper
-
Riedmüller, Reinhard;
Seeger, Mark M.;
Baier, Harald;
Busch, Christoph;
Wolthusen, Stephen.
(2010)
Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection.
2nd International Workshop On Security and Communication networks (IWSCN), May 26-28, 2010, Karlstad, Sweden.
Academic chapter/article/Conference paper
-
Seeger, Mark M.;
Wolthusen, Stephen.
(2010)
Observation mechanism and cost model for tightly coupled asymmetric concurrency.
The Fifth International Conference on Systems ICONS 2010 : 11-16 April 2010 Menuires, France.
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2009)
Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination.
IMF '09. Fifth International Conference on IT Security Incident Management and IT Forensics, 2009.
Academic chapter/article/Conference paper
-
Borgen, Halvor;
Bours, Patrick;
Wolthusen, Stephen.
(2009)
Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance.
Advances in Biometrics.
Academic chapter/article/Conference paper
-
Busch, Christoph;
Wolthusen, Stephen.
(2009)
Non-Forensic Odontological Biometrics.
IIH-MSP '09. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009.
Academic chapter/article/Conference paper
-
Ebinger, Peter;
Wolthusen, Stephen.
(2009)
Efficient state estimation and Byzantine behavior identification in Tactical MANETs.
Proceedings of the Military Communications Conference, MILCOM 2009.
Academic chapter/article/Conference paper
-
Reidt, Steffen;
Wolthusen, Stephen.
(2009)
Energy-efficient key distribution and revocation in tactical networks with asymmetric links.
Proceedings of the Military Communications Conference, MILCOM 2009.
Academic chapter/article/Conference paper
-
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2009)
Modeling And Detecting Anomalies In Scada Systems.
Critical Infrastructure Protection II.
Academic chapter/article/Conference paper
-
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2009)
Using Physical Models for Anomaly Detection in Control Systems.
Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009.
Academic chapter/article/Conference paper
-
Wolthusen, Stephen.
(2009)
Overcast: Forensic Discovery in Cloud Environments.
IMF '09. Fifth International Conference on IT Security Incident Management and IT Forensics, 2009.
Academic chapter/article/Conference paper
-
Zhou, Xuebing;
Wolthusen, Stephen;
Busch, Christoph;
Kuijper, Arjan.
(2009)
A Security Analysis of Biometric Template Protection Schemes.
Image Analysis and Recognition.
Academic chapter/article/Conference paper
-
Zhou, Xuebing;
Wolthusen, Stephen;
Busch, Christoph;
Kuijper, Arjan.
(2009)
Feature Correlation Attack on Biometric Privacy Protection Schemes.
IIH-MSP '09. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009.
Academic chapter/article/Conference paper