ISIS Publications

Export 119 results:
Sort by: Author Title Type [ Year  (Asc)]
Filters: Author is Koutsoukos, Xenofon  [Clear All Filters]
2016
Potteiger, B., G. Martins, and X. Koutsoukos, "Software and attack centric integrated threat modeling for quantitative risk assessment", Proceedings of the Symposium and Bootcamp on the Science of Security, Pittsburgh, PA, ACM, pp. 99–108, 2016.
Laszka, A., B. Potteiger, Y. Vorobeychik, S. Amin, and X. Koutsoukos, "Vulnerability of transportation networks to traffic-signal tampering", Proceedings of the 7th International Conference on Cyber-Physical Systems, Vienna, Austria, IEEE Press, pp. 16, 2016.
, "Optimal thresholds for anomaly-based intrusion detection in dynamical environments", 7th Conference on Decision and Game Theory for Security (GameSec 2016), 11/2016.  Download: paper.pdf (442.01 KB)
2017
Hasan, S., A. Ghafouri, A. Dubey, G. Karsai, and X. Koutsoukos, "Vulnerability Analysis of Power Systems Based on Cyber-Attack and Defense Models", Innovative Smart Grid Technologies (ISGT 2018), Washington DC, 2017. Abstract  Download: paper.pdf (411.12 KB)
Ghafouri, A., A. Laszka, A. Dubey, and X. Koutsoukos, "Optimal Detection of Faulty Traffic Sensors Used in Route Planning", 2nd Workshop on Science of Smart City Operations and Platforms Engineering, Pittsburgh, PA, ACM, 04/2017.  Download: scope17.pdf (1.8 MB)
2018
2019