ISIS Publications

Export 11 results:
Sort by: Author Title [ Type  (Asc)] Year
Filters: Author is Yevgeniy Vorobeychik  [Clear All Filters]
Conference Paper
, "Optimal thresholds for anomaly-based intrusion detection in dynamical environments", 7th Conference on Decision and Game Theory for Security (GameSec 2016), 11/2016.  Download: paper.pdf (442.01 KB)
Mukhopadhyay, A., Y. Vorobeychik, A. Dubey, and G. Biswas, "Prioritized Allocation of Emergency Responders based on a Continuous-Time Incident Prediction Model", Sixteenth International Conference on Antonomous Agents and Multiagent Sytems, Sao Paulo - Brazil, 05/2017.
Abbas, W., A. Laszka, Y. Vorobeychik, and X. Koutsoukos, "Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems", ACM Workshop on Cyber-Physical Systems Security & Privacy (in Conjunction with 22nd ACM Conference on Computer and Communications Security (CCS)), Denver, CO, ACM, 09/2015.
Laszka, A., B. Potteiger, Y. Vorobeychik, S. Amin, and X. Koutsoukos, "Vulnerability of transportation networks to traffic-signal tampering", Proceedings of the 7th International Conference on Cyber-Physical Systems, Vienna, Austria, IEEE Press, pp. 16, 2016.
Conference Proceedings
Abbas, W., S. Bhatia, Y. Vorobeychik, and X. Koutsoukos, "Immunization Against Infection Propagation In Heterogeneous Networks", 13th IEEE International Symposium on Network Computing & Applications, Cambridge, MA, pp. 296-300, 2014.
Abbas, W., Y. Vorobeychik, and X. Koutsoukos, "Resilient Consensus Protocol in the Presence of Trusted Nodes", th IEEE International Symposium on Resilient Control Systems: IEEE, 2014.
Journal Article
Miscellaneous