Navigation

  • Skip to Content
NTNU Home NTNU Home

ntnu.edu

  • Studies
    • Master's programmes in English
    • For exchange students
    • PhD opportunities
    • All programmes of study
    • Courses
    • Financing
    • Language requirements
    • Application process
    • Academic calendar
    • FAQ
  • Research and innovation
    • NTNU research
    • Research excellence
    • Strategic research areas
    • Innovation resources
    • PhD opportunities
  • Life and housing
    • Student in Trondheim
    • Student in Gjøvik
    • Student in Ålesund
    • For researchers
    • Life and housing
  • About NTNU
    • Contact us
    • Faculties and departments
    • Libraries
    • International researcher support
    • Vacancies
    • About NTNU
    • Maps
  1. Employees

Språkvelger

Norsk

Stephen Dirk Bjørn Wolthusen

Download press photo
Download press photo
Foto:

Stephen Dirk Bjørn Wolthusen

Professor
Department of Information Security and Communication Technology

stephen.wolthusen@ntnu.no
+4761135289 Ametyst-bygget, Gjøvik
Publications Teaching

Publications

  • Chronological
  • By category
  • See all publications in Cristin

2025

  • Gajic, Natasa; Wolthusen, Stephen Dirk Bjørn. (2025) Improved Distribution Network Topology Generation with Hierarchical Information Overlay. IFIP Advances in Information and Communication Technology
    Academic article
  • Gajic, Natasa; Wolthusen, Stephen Dirk Bjørn. (2025) Locally Optimal Information Pathways in the Presence of Static Adversaries for a Hierarchical Smart Distribution Grid Model. Lecture Notes in Computer Science (LNCS)
    Academic article

2024

  • Gajic, Natasa; Wolthusen, Stephen Dirk Bjørn. (2024) Adaptable Smart Distribution Grid Topology Generation for Enhanced Resilience. Springer Berlin/Heidelberg
    Academic chapter/article/Conference paper
  • Wright, James Griffin; Wolthusen, Stephen Dirk Bjørn. (2024) A Contextual Integrity Property to Impede Privacy Violations in 5G Networks. IFIP Advances in Information and Communication Technology
    Academic article
  • Wright, James G; Wolthusen, Stephen Dirk Bjørn. (2024) Formal Methods for Secure Cyber-Physical Systems Workshop: Re- port on the First Edition. Lecture Notes in Computer Science (LNCS)
    Academic article

2022

  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. (2022) Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466)). International Journal of Critical Infrastructure Protection
    Errata

2021

  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2021) Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring. International Journal of Advanced Computer Science and Applications (IJACSA)
    Academic article
  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. (2021) Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus. International Journal of Critical Infrastructure Protection
    Academic article
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2021) A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda. Lecture Notes in Networks and Systems
    Academic article

2020

  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection. International Conference on Cyber Conflict, CYCON
    Academic article
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) A Review of Asset-Centric Threat Modelling Approaches. International Journal of Advanced Computer Science and Applications (IJACSA)
    Academic article
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection. Wirtschaftsinformatik
    Academic article
  • Nweke, Livinus Obiora; Yeng, Prosper; Wolthusen, Stephen; Yang, Bian. (2020) Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices. International Journal of Advanced Computer Science and Applications (IJACSA)
    Academic article
  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen. (2020) Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Resilience Analysis of Software-Defined Networks Using Queueing Networks. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2020) Legal requirements toward enhancing the security of medical devices. International Journal of Advanced Computer Science and Applications (IJACSA)
    Academic literature review
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2020) Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice. International Journal of Advanced Computer Science and Applications (IJACSA)
    Academic article

2019

  • Gul, Ammara; Wolthusen, Stephen. (2019) In-cycle sequential topology faults and attacks: Effects on state estimation. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen. (2019) Threat Analysis for Smart Homes. Future Internet
    Academic article
  • Nweke, Livinus Obiora; Wolthusen, Stephen; Mancini, Luigi V.. (2019) A Framework for the Validation of Network Artifacts. Norsk Informasjonssikkerhetskonferanse (NISK)
    Academic article

2018

  • Wright, James G; Wolthusen, Stephen. (2018) De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Gul, Ammara; Wolthusen, Stephen. (2018) Error propagation after reordering attacks on hierarchical state estimation. IFIP Advances in Information and Communication Technology
    Academic article
  • Baiocco, Alessio; Wolthusen, Stephen. (2018) Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol. IEEE Power & Energy Society General Meeting
    Academic article
  • Darwish, Salaheddin; Nouretdinov, Ilia; Wolthusen, Stephen. (2018) A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements. Lecture Notes in Computer Science (LNCS)
    Academic article

2017

  • Wright, James G; Wolthusen, Stephen. (2017) Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Rigolin Ferreira Lopes, Roberto; Nieminen, Mikko; Viidanoja, Antti; Wolthusen, Stephen. (2017) Reactive/Proactive Connectivity Management in a Tactical Service-Oriented Infrastructure. IEEE Sarnoff Symposium
    Academic chapter/article/Conference paper
  • Kayem, Anne V.D.M.; Meinel, Christoph; Wolthusen, Stephen. (2017) A smart micro-grid architecture for resource constrained environments. Advanced Information Networking and Applications
    Academic article
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Security Requirements for the Deployment of Services Across Tactical SOA. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Gkioulos, Vasileios; Risthein, Erko; Wolthusen, Stephen. (2017) TACTICS: Validation of the security framework developed for tactical SOA. Journal of Information Security and Applications
    Academic article
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017. Advances in Intelligent Systems and Computing
    Academic article
  • Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph. (2017) Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids. Springer
    Academic chapter/article/Conference paper
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) A Security Policy Infrastructure for Tactical Service Oriented Architectures. Springer
    Academic chapter/article/Conference paper
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2017) Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures. Advances in Intelligent Systems and Computing
    Academic article
  • Weldehawaryat, Goitom Kahsay; Ambassa, Pacome L.; Marufu, Anesu M.C.; Wolthusen, Stephen; Kayem, Anne V.D.M.. (2017) Decentralised scheduling of power consumption in micro-grids: Optimisation and security. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2017) Power auctioning in resource constrained micro-grids: Cases of cheating. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Alcaraz, Cristina; Lopez, Javier; Wolthusen, Stephen. (2017) OCPP Protocol: Security Threats and Challenges. IEEE Transactions on Smart Grid
    Academic article

2016

  • Gkioulos, Vasileios; Wolthusen, Stephen D.. (2016) Securing tactical service oriented architectures. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2016) MPLS Policy Target Recognition Network. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Cristoph. (2016) Privacy Violations in Constrained Micro-grids: Adversarial Cases. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Almulla, Sameera; Iraqi, Youssef; Wolthusen, Stephen. (2016) Inferring relevance and presence of evidence in service-oriented and SaaS architectures. Proceedings of the IEEE Symposium on Computers and Communications
    Academic article
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2016) A distributed continuous double auction framework for resource constrained microgrids. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Gkioulos, Vasileios; Wolthusen, Stephen; Flizikowski, Adam; Stachowicz, Anna; Nogalski, Dariusz; Gleba, Kamil. (2016) Interoperability of security and quality of Service Policies Over Tactical SOA. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Alwasel, Bader; Wolthusen, Stephen. (2016) Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use. Springer
    Academic chapter/article/Conference paper
  • Baiocco, Alessio; Foglietta, Chiara; Wolthusen, Stephen. (2016) Delay and Jitter Attacks on Hierarchical State Estimation. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2016) Efficient security policy reconciliation in tactical service oriented architectures. Communications in Computer and Information Science (CCIS)
    Academic article
  • Gkioulos, Vasileios; Wolthusen, Stephen; Iossifides, Athanasios. (2016) A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE). Norsk Informasjonssikkerhetskonferanse (NISK)
    Academic article
  • Kayem, Anne; Strauss, Heinrich; Wolthusen, Stephen D.; Meinel, Christoph. (2016) Key Management for Secure Demand Data Communication in Constrained Micro-grids. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Alwasel, Bader; Wolthusen, Stephen. (2016) Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2016) Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. SciTePress
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2016) An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms. Springer
    Academic chapter/article/Conference paper
  • Alcaraz, Cristina; Lopeza, Javier; Wolthusen, Stephen. (2016) Policy enforcement system for secure interoperable control in distributed Smart Grid systems. Journal of Network and Computer Applications
    Academic article

2015

  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2015) Secure distributed demand projection in micro-grids. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2015) Modelling Interdependencies over Incomplete Join Structures of Power Law Networks. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Alwasel, Bader; Wolthusen, Stephen. (2015) Structural Controllability Analysis via Embedding Power Dominating Set Approximation in Erd˝os-R´enyi Graphs. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Lopes, Roberto Rigolin Ferreira; Wolthusen, Stephen. (2015) Distributed Security Policies for Service-Oriented Architectures over Tactical Networks. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph. (2015) Robust Snapshot Algorithm for Power Consumption Monitoring in Computationally Constrained Micro-Grids. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen. (2015) Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs. Springer
    Academic chapter/article/Conference paper
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2015) Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks. Norsk Informasjonssikkerhetskonferanse (NISK)
    Academic article
  • Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Christoph. (2015) Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids. Springer
    Academic chapter/article/Conference paper

2014

  • Alwasel, Bader; Wolthusen, Stephen. (2014) Reconstruction of Structural Controllability over Erd˝os-Rényi Graphs via Power Dominating Sets. Association for Computing Machinery (ACM)
    Academic chapter/article/Conference paper
  • Alcaraz, Cristina; Wolthusen, Stephen. (2014) Recovery of Structural Controllability for Control Systems. Springer
    Academic chapter/article/Conference paper
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2014) A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models. IGI Global
    Academic chapter/article/Conference paper
  • Baiocco, Alessio; Wolthusen, Stephen. (2014) Stability of Power Network State Estimation Under Attack. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Alarifi, Suaad; Wolthusen, Stephen. (2014) Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems. Springer
    Academic chapter/article/Conference paper
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2014) Malicious MPLS Policy Engine Reconnaissance. Springer
    Academic chapter/article/Conference paper
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2014) Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence. Springer
    Academic chapter/article/Conference paper
  • Alarifi, Suaad; Wolthusen, Stephen. (2014) Mitigation of Cloud-Internal Denial of Service Attacks. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Baiocco, Alessio; Wolthusen, Stephen; Foglietta, Chiara; Panzieri, Stefano. (2014) A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation. IEEE conference proceedings
    Academic chapter/article/Conference paper

2013

  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2013) Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures. Springer
    Academic chapter/article/Conference paper
  • Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen. (2013) Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal. Springer
    Academic chapter/article/Conference paper
  • Alarifi, Suaad; Wolthusen, Stephen. (2013) Robust Coordination of Cloud-Internal Denial of Service Attacks. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Weston, Peter; Wolthusen, Stephen. (2013) Forensic Entropy Analysis of Microsoft Windows Storage Volumes. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2013) An Analysis of Service Degradation Attacks against Real-Time MPLS Networks. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Bologna, Sandro; Hämmerli, Bernhard Markus; Gritzalis, Dimitris; Wolthusen, Stephen. (2013) Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers. Springer Lecture Notes in Computer Science (LNCS) (6983)
    Academic anthology/Conference proceedings
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation. Springer
    Academic chapter/article/Conference paper
  • Alarifi, Suaad; Wolthusen, Stephen. (2013) Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines. Springer
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Locating subverted processes using random packet comparison in SCADA systems. International Journal of Critical Infrastructures
    Academic article
  • Franke, Katrin; Hjelmås, Erik; Wolthusen, Stephen. (2013) Advancing Digital Forensics. Springer
    Academic chapter/article/Conference paper
  • Feng, Yangyue; Foglietta, Chiara; Baiocco, Alessio; Panzieri, Stefano; Wolthusen, Stephen. (2013) Malicious false data injection in hierarchical electric power grid state estimation systems. ACM Publications
    Academic chapter/article/Conference paper

2012

  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2012) Modelling Approaches. Springer
    Academic chapter/article/Conference paper
  • Lopez, Javier; Setola, Roberto; Wolthusen, Stephen. (2012) Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer Lecture Notes in Computer Science (LNCS) (7130)
    Academic anthology/Conference proceedings
  • Lopez, Javier; Setola, Roberto; Wolthusen, Stephen. (2012) Overview of Critical Information Infrastructure Protection. Springer
    Academic chapter/article/Conference paper
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2012) Algorithmic approach for clandestine localisation and tracking in short-range environments. International Journal of Communication Networks and Distributed Systems
    Academic article
  • Seeger, Mark M.; Wolthusen, Stephen. (2012) Towards Concurrent Data Sampling Using GPU Coprocessing. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper

2011

  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2011) A Formal Adversary Capability Model for SCADA Environments. Springer
    Academic chapter/article/Conference paper
  • Xenakis, Christos; Wolthusen, Stephen. (2011) Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers. Springer Lecture Notes in Computer Science (LNCS) (6712)
    Academic anthology/Conference proceedings
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2011) A Propagation Model of A Vulnerability Mitigation Computer Worm – Seawave. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2011) On the feasibility of carrying out live real-time forensics for modern intelligent vehicles. Springer
    Academic chapter/article/Conference paper
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2011) Threat Analysis Model of an Agent-Based Vulnerability Mitigation Mechanism Using Bayesian Belief Networks. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Reidt, Steffen; Ebinger, Peter; Kuijper, Arjan; Wolthusen, Stephen. (2011) Resource-Constrained Signal Propagation Modeling for Tactical Mobile Ad Hoc Networks. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper

2010

  • Lunden, Nils; Sveen, Robin; Lund, Hans; Svendsen, Nils Kalstad; Wolthusen, Stephen. (2010) Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments. Springer
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Host-Based Security Sensor Integrity in Multiprocessing Environments. Springer
    Academic chapter/article/Conference paper
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks. Springer
    Academic chapter/article/Conference paper
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Forensic Tracking and Mobility Prediction in Vehicular Networks. Springer
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. Springer
    Academic chapter/article/Conference paper
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. Springer
    Academic chapter/article/Conference paper
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2010) Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2010) Agent-based host enumeration and vulnerability scanning using dynamic topology information. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Seeger, Mark M.; Wolthusen, Stephen. (2010) Observation mechanism and cost model for tightly coupled asymmetric concurrency. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Mairaj, Danish; Wolthusen, Stephen; Busch, Christoph. (2010) Teeth Segmentation and Feature Extraction for Odontological Biometrics. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Riedmüller, Reinhard; Seeger, Mark M.; Baier, Harald; Busch, Christoph; Wolthusen, Stephen. (2010) Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks. Springer
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Trouble Brewing: Using Observations of Invariant Behavior to Detect. Springer
    Academic chapter/article/Conference paper

2009

  • Reidt, Steffen; Wolthusen, Stephen. (2009) Energy-efficient key distribution and revocation in tactical networks with asymmetric links. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Wolthusen, Stephen. (2009) Overcast: Forensic Discovery in Cloud Environments. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Ebinger, Peter; Wolthusen, Stephen. (2009) Efficient state estimation and Byzantine behavior identification in Tactical MANETs. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2009) Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Zhou, Xuebing; Wolthusen, Stephen; Busch, Christoph; Kuijper, Arjan. (2009) Feature Correlation Attack on Biometric Privacy Protection Schemes. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2009) Using Physical Models for Anomaly Detection in Control Systems. Springer
    Academic chapter/article/Conference paper
  • Busch, Christoph; Wolthusen, Stephen. (2009) Non-Forensic Odontological Biometrics. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Zhou, Xuebing; Wolthusen, Stephen; Busch, Christoph; Kuijper, Arjan. (2009) A Security Analysis of Biometric Template Protection Schemes. Springer
    Academic chapter/article/Conference paper
  • Borgen, Halvor; Bours, Patrick; Wolthusen, Stephen. (2009) Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance. Springer
    Academic chapter/article/Conference paper
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2009) Modeling And Detecting Anomalies In Scada Systems. Springer Science+Business Media B.V.
    Academic chapter/article/Conference paper

Journal publications

  • Gajic, Natasa; Wolthusen, Stephen Dirk Bjørn. (2025) Improved Distribution Network Topology Generation with Hierarchical Information Overlay. IFIP Advances in Information and Communication Technology
    Academic article
  • Gajic, Natasa; Wolthusen, Stephen Dirk Bjørn. (2025) Locally Optimal Information Pathways in the Presence of Static Adversaries for a Hierarchical Smart Distribution Grid Model. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Wright, James Griffin; Wolthusen, Stephen Dirk Bjørn. (2024) A Contextual Integrity Property to Impede Privacy Violations in 5G Networks. IFIP Advances in Information and Communication Technology
    Academic article
  • Wright, James G; Wolthusen, Stephen Dirk Bjørn. (2024) Formal Methods for Secure Cyber-Physical Systems Workshop: Re- port on the First Edition. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. (2022) Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466)). International Journal of Critical Infrastructure Protection
    Errata
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2021) Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring. International Journal of Advanced Computer Science and Applications (IJACSA)
    Academic article
  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. (2021) Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus. International Journal of Critical Infrastructure Protection
    Academic article
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2021) A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda. Lecture Notes in Networks and Systems
    Academic article
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection. International Conference on Cyber Conflict, CYCON
    Academic article
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) A Review of Asset-Centric Threat Modelling Approaches. International Journal of Advanced Computer Science and Applications (IJACSA)
    Academic article
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection. Wirtschaftsinformatik
    Academic article
  • Nweke, Livinus Obiora; Yeng, Prosper; Wolthusen, Stephen; Yang, Bian. (2020) Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices. International Journal of Advanced Computer Science and Applications (IJACSA)
    Academic article
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2020) Legal requirements toward enhancing the security of medical devices. International Journal of Advanced Computer Science and Applications (IJACSA)
    Academic literature review
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2020) Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice. International Journal of Advanced Computer Science and Applications (IJACSA)
    Academic article
  • Gul, Ammara; Wolthusen, Stephen. (2019) In-cycle sequential topology faults and attacks: Effects on state estimation. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen. (2019) Threat Analysis for Smart Homes. Future Internet
    Academic article
  • Nweke, Livinus Obiora; Wolthusen, Stephen; Mancini, Luigi V.. (2019) A Framework for the Validation of Network Artifacts. Norsk Informasjonssikkerhetskonferanse (NISK)
    Academic article
  • Wright, James G; Wolthusen, Stephen. (2018) De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Gul, Ammara; Wolthusen, Stephen. (2018) Error propagation after reordering attacks on hierarchical state estimation. IFIP Advances in Information and Communication Technology
    Academic article
  • Baiocco, Alessio; Wolthusen, Stephen. (2018) Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol. IEEE Power & Energy Society General Meeting
    Academic article
  • Darwish, Salaheddin; Nouretdinov, Ilia; Wolthusen, Stephen. (2018) A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Wright, James G; Wolthusen, Stephen. (2017) Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Kayem, Anne V.D.M.; Meinel, Christoph; Wolthusen, Stephen. (2017) A smart micro-grid architecture for resource constrained environments. Advanced Information Networking and Applications
    Academic article
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Security Requirements for the Deployment of Services Across Tactical SOA. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Gkioulos, Vasileios; Risthein, Erko; Wolthusen, Stephen. (2017) TACTICS: Validation of the security framework developed for tactical SOA. Journal of Information Security and Applications
    Academic article
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017. Advances in Intelligent Systems and Computing
    Academic article
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures. Advances in Intelligent Systems and Computing
    Academic article
  • Weldehawaryat, Goitom Kahsay; Ambassa, Pacome L.; Marufu, Anesu M.C.; Wolthusen, Stephen; Kayem, Anne V.D.M.. (2017) Decentralised scheduling of power consumption in micro-grids: Optimisation and security. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2017) Power auctioning in resource constrained micro-grids: Cases of cheating. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Alcaraz, Cristina; Lopez, Javier; Wolthusen, Stephen. (2017) OCPP Protocol: Security Threats and Challenges. IEEE Transactions on Smart Grid
    Academic article
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2016) MPLS Policy Target Recognition Network. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Almulla, Sameera; Iraqi, Youssef; Wolthusen, Stephen. (2016) Inferring relevance and presence of evidence in service-oriented and SaaS architectures. Proceedings of the IEEE Symposium on Computers and Communications
    Academic article
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2016) A distributed continuous double auction framework for resource constrained microgrids. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2016) Efficient security policy reconciliation in tactical service oriented architectures. Communications in Computer and Information Science (CCIS)
    Academic article
  • Gkioulos, Vasileios; Wolthusen, Stephen; Iossifides, Athanasios. (2016) A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE). Norsk Informasjonssikkerhetskonferanse (NISK)
    Academic article
  • Alwasel, Bader; Wolthusen, Stephen. (2016) Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Alcaraz, Cristina; Lopeza, Javier; Wolthusen, Stephen. (2016) Policy enforcement system for secure interoperable control in distributed Smart Grid systems. Journal of Network and Computer Applications
    Academic article
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2015) Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks. Norsk Informasjonssikkerhetskonferanse (NISK)
    Academic article
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Locating subverted processes using random packet comparison in SCADA systems. International Journal of Critical Infrastructures
    Academic article
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2012) Algorithmic approach for clandestine localisation and tracking in short-range environments. International Journal of Communication Networks and Distributed Systems
    Academic article

Books

  • Bologna, Sandro; Hämmerli, Bernhard Markus; Gritzalis, Dimitris; Wolthusen, Stephen. (2013) Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers. Springer Lecture Notes in Computer Science (LNCS) (6983)
    Academic anthology/Conference proceedings
  • Lopez, Javier; Setola, Roberto; Wolthusen, Stephen. (2012) Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer Lecture Notes in Computer Science (LNCS) (7130)
    Academic anthology/Conference proceedings
  • Xenakis, Christos; Wolthusen, Stephen. (2011) Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers. Springer Lecture Notes in Computer Science (LNCS) (6712)
    Academic anthology/Conference proceedings

Part of book/report

  • Gajic, Natasa; Wolthusen, Stephen Dirk Bjørn. (2024) Adaptable Smart Distribution Grid Topology Generation for Enhanced Resilience. Springer Berlin/Heidelberg
    Academic chapter/article/Conference paper
  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen. (2020) Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Resilience Analysis of Software-Defined Networks Using Queueing Networks. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Rigolin Ferreira Lopes, Roberto; Nieminen, Mikko; Viidanoja, Antti; Wolthusen, Stephen. (2017) Reactive/Proactive Connectivity Management in a Tactical Service-Oriented Infrastructure. IEEE Sarnoff Symposium
    Academic chapter/article/Conference paper
  • Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph. (2017) Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids. Springer
    Academic chapter/article/Conference paper
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) A Security Policy Infrastructure for Tactical Service Oriented Architectures. Springer
    Academic chapter/article/Conference paper
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2017) Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Gkioulos, Vasileios; Wolthusen, Stephen D.. (2016) Securing tactical service oriented architectures. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Cristoph. (2016) Privacy Violations in Constrained Micro-grids: Adversarial Cases. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Gkioulos, Vasileios; Wolthusen, Stephen; Flizikowski, Adam; Stachowicz, Anna; Nogalski, Dariusz; Gleba, Kamil. (2016) Interoperability of security and quality of Service Policies Over Tactical SOA. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Alwasel, Bader; Wolthusen, Stephen. (2016) Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use. Springer
    Academic chapter/article/Conference paper
  • Baiocco, Alessio; Foglietta, Chiara; Wolthusen, Stephen. (2016) Delay and Jitter Attacks on Hierarchical State Estimation. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Kayem, Anne; Strauss, Heinrich; Wolthusen, Stephen D.; Meinel, Christoph. (2016) Key Management for Secure Demand Data Communication in Constrained Micro-grids. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2016) Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. SciTePress
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2016) An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms. Springer
    Academic chapter/article/Conference paper
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2015) Secure distributed demand projection in micro-grids. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2015) Modelling Interdependencies over Incomplete Join Structures of Power Law Networks. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Alwasel, Bader; Wolthusen, Stephen. (2015) Structural Controllability Analysis via Embedding Power Dominating Set Approximation in Erd˝os-R´enyi Graphs. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Lopes, Roberto Rigolin Ferreira; Wolthusen, Stephen. (2015) Distributed Security Policies for Service-Oriented Architectures over Tactical Networks. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph. (2015) Robust Snapshot Algorithm for Power Consumption Monitoring in Computationally Constrained Micro-Grids. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen. (2015) Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs. Springer
    Academic chapter/article/Conference paper
  • Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Christoph. (2015) Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids. Springer
    Academic chapter/article/Conference paper
  • Alwasel, Bader; Wolthusen, Stephen. (2014) Reconstruction of Structural Controllability over Erd˝os-Rényi Graphs via Power Dominating Sets. Association for Computing Machinery (ACM)
    Academic chapter/article/Conference paper
  • Alcaraz, Cristina; Wolthusen, Stephen. (2014) Recovery of Structural Controllability for Control Systems. Springer
    Academic chapter/article/Conference paper
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2014) A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models. IGI Global
    Academic chapter/article/Conference paper
  • Baiocco, Alessio; Wolthusen, Stephen. (2014) Stability of Power Network State Estimation Under Attack. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Alarifi, Suaad; Wolthusen, Stephen. (2014) Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems. Springer
    Academic chapter/article/Conference paper
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2014) Malicious MPLS Policy Engine Reconnaissance. Springer
    Academic chapter/article/Conference paper
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2014) Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence. Springer
    Academic chapter/article/Conference paper
  • Alarifi, Suaad; Wolthusen, Stephen. (2014) Mitigation of Cloud-Internal Denial of Service Attacks. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Baiocco, Alessio; Wolthusen, Stephen; Foglietta, Chiara; Panzieri, Stefano. (2014) A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2013) Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures. Springer
    Academic chapter/article/Conference paper
  • Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen. (2013) Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal. Springer
    Academic chapter/article/Conference paper
  • Alarifi, Suaad; Wolthusen, Stephen. (2013) Robust Coordination of Cloud-Internal Denial of Service Attacks. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Weston, Peter; Wolthusen, Stephen. (2013) Forensic Entropy Analysis of Microsoft Windows Storage Volumes. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2013) An Analysis of Service Degradation Attacks against Real-Time MPLS Networks. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation. Springer
    Academic chapter/article/Conference paper
  • Alarifi, Suaad; Wolthusen, Stephen. (2013) Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines. Springer
    Academic chapter/article/Conference paper
  • Franke, Katrin; Hjelmås, Erik; Wolthusen, Stephen. (2013) Advancing Digital Forensics. Springer
    Academic chapter/article/Conference paper
  • Feng, Yangyue; Foglietta, Chiara; Baiocco, Alessio; Panzieri, Stefano; Wolthusen, Stephen. (2013) Malicious false data injection in hierarchical electric power grid state estimation systems. ACM Publications
    Academic chapter/article/Conference paper
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2012) Modelling Approaches. Springer
    Academic chapter/article/Conference paper
  • Lopez, Javier; Setola, Roberto; Wolthusen, Stephen. (2012) Overview of Critical Information Infrastructure Protection. Springer
    Academic chapter/article/Conference paper
  • Seeger, Mark M.; Wolthusen, Stephen. (2012) Towards Concurrent Data Sampling Using GPU Coprocessing. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2011) A Formal Adversary Capability Model for SCADA Environments. Springer
    Academic chapter/article/Conference paper
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2011) A Propagation Model of A Vulnerability Mitigation Computer Worm – Seawave. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2011) On the feasibility of carrying out live real-time forensics for modern intelligent vehicles. Springer
    Academic chapter/article/Conference paper
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2011) Threat Analysis Model of an Agent-Based Vulnerability Mitigation Mechanism Using Bayesian Belief Networks. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Reidt, Steffen; Ebinger, Peter; Kuijper, Arjan; Wolthusen, Stephen. (2011) Resource-Constrained Signal Propagation Modeling for Tactical Mobile Ad Hoc Networks. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Lunden, Nils; Sveen, Robin; Lund, Hans; Svendsen, Nils Kalstad; Wolthusen, Stephen. (2010) Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments. Springer
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Host-Based Security Sensor Integrity in Multiprocessing Environments. Springer
    Academic chapter/article/Conference paper
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks. Springer
    Academic chapter/article/Conference paper
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Forensic Tracking and Mobility Prediction in Vehicular Networks. Springer
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. Springer
    Academic chapter/article/Conference paper
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. Springer
    Academic chapter/article/Conference paper
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2010) Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2010) Agent-based host enumeration and vulnerability scanning using dynamic topology information. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Seeger, Mark M.; Wolthusen, Stephen. (2010) Observation mechanism and cost model for tightly coupled asymmetric concurrency. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Mairaj, Danish; Wolthusen, Stephen; Busch, Christoph. (2010) Teeth Segmentation and Feature Extraction for Odontological Biometrics. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Riedmüller, Reinhard; Seeger, Mark M.; Baier, Harald; Busch, Christoph; Wolthusen, Stephen. (2010) Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks. Springer
    Academic chapter/article/Conference paper
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Trouble Brewing: Using Observations of Invariant Behavior to Detect. Springer
    Academic chapter/article/Conference paper
  • Reidt, Steffen; Wolthusen, Stephen. (2009) Energy-efficient key distribution and revocation in tactical networks with asymmetric links. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Wolthusen, Stephen. (2009) Overcast: Forensic Discovery in Cloud Environments. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Ebinger, Peter; Wolthusen, Stephen. (2009) Efficient state estimation and Byzantine behavior identification in Tactical MANETs. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2009) Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Zhou, Xuebing; Wolthusen, Stephen; Busch, Christoph; Kuijper, Arjan. (2009) Feature Correlation Attack on Biometric Privacy Protection Schemes. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2009) Using Physical Models for Anomaly Detection in Control Systems. Springer
    Academic chapter/article/Conference paper
  • Busch, Christoph; Wolthusen, Stephen. (2009) Non-Forensic Odontological Biometrics. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Zhou, Xuebing; Wolthusen, Stephen; Busch, Christoph; Kuijper, Arjan. (2009) A Security Analysis of Biometric Template Protection Schemes. Springer
    Academic chapter/article/Conference paper
  • Borgen, Halvor; Bours, Patrick; Wolthusen, Stephen. (2009) Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance. Springer
    Academic chapter/article/Conference paper
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2009) Modeling And Detecting Anomalies In Scada Systems. Springer Science+Business Media B.V.
    Academic chapter/article/Conference paper

Teaching

Courses

  • IIK8110 - Research Methods in Information Security and Communication Technology
  • IMT4125 - Network Security
  • IMT4203 - Critical Infrastructure Security
  • IIKG6502 - Critical Infrastructure Security
  • IMT6003 - Information Security and Communication Technology Summer School
  • TM8110 - PhD Topics in Information Security and Communication Technology
  • IMT6011 - Introduction to Information Security

NTNU – Norwegian University of Science and Technology

  • For employees
  • |
  • For students
  • |
  • Intranet
  • |
  • Blackboard

Studies

  • Master's programmes in English
  • For exchange students
  • PhD opportunities
  • Courses
  • Career development
  • Continuing education
  • Application process

News

  • NTNU News
  • Vacancies

About NTNU

  • About the university
  • Libraries
  • NTNU's strategy
  • Research excellence
  • Strategic research areas
  • Organizational chart

Contact

  • Contact NTNU
  • Employees
  • Find experts
  • Press contacts
  • Researcher support
  • Maps

NTNU in three cities

  • NTNU in Gjøvik
  • NTNU in Trondheim
  • NTNU in Ålesund

About this website

  • Use of cookies
  • Accessibility statement
  • Privacy policy
  • Editorial responsibility
Facebook Instagram Linkedin Snapchat Tiktok Youtube
Sign In
NTNU logo