Search Results - "Miles McQueen"
-
1
Smart Grid Data Integrity Attacks
Published in IEEE transactions on smart grid (01-09-2013)“…Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored and transmitted over a SCADA…”
Get full text
Journal Article -
2
Information gain based dimensionality selection for classifying text documents
Published in 2013 IEEE Congress on Evolutionary Computation (01-06-2013)“…Selecting the optimal dimensions for various knowledge extraction applications is an essential component of data mining. Dimensionality selection techniques…”
Get full text
Conference Proceeding -
3
Mining Bug Databases for Unidentified Software Vulnerabilities
Published in 2012 5th International Conference on Human System Interactions (01-06-2012)“…Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been…”
Get full text
Conference Proceeding -
4
Vulnerability identification and classification via text mining bug databases
Published in IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society (01-10-2014)“…As critical and sensitive systems increasingly rely on complex software systems, identifying software vulnerabilities is becoming increasingly important. It…”
Get full text
Conference Proceeding -
5
Software and human vulnerabilities
Published in IECON 2010 - 36th Annual Conference on IEEE Industrial Electronics Society (01-11-2010)“…The collection of slides covered the following topics: power grid system; substation data; software vulnerability; human vulnerability; risk analysis; control…”
Get full text
Conference Proceeding -
6
Are Vulnerability Disclosure Deadlines Justified?
Published in 2011 Third International Workshop on Security Measurements and Metrics (01-09-2011)“…Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of…”
Get full text
Conference Proceeding -
7
Empirical Estimates and Observations of 0Day Vulnerabilities
Published in 2009 42nd Hawaii International Conference on System Sciences (01-01-2009)“…We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly…”
Get full text
Conference Proceeding -
8
RNEDE: Resilient network design environment
Published in 2010 3rd International Symposium on Resilient Control Systems (01-08-2010)“…Modern living is more and more dependent on the intricate web of critical infrastructure systems. The failure or damage of such systems can cause huge…”
Get full text
Conference Proceeding -
9
Metrics for assessment of smart grid data integrity attacks
Published in 2012 IEEE Power and Energy Society General Meeting (01-07-2012)“…There is an emerging consensus that the nation's electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on…”
Get full text
Conference Proceeding -
10
Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System
Published in Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) (2006)“…We propose a new methodology for obtaining a quantitative measurement of the risk reduction achieved when a control system is modified with the intent to…”
Get full text
Conference Proceeding -
11
Resilient control systems: Next generation design research
Published in 2009 2nd Conference on Human System Interactions (01-05-2009)“…Since digital control systems were introduced to the market more than 30 years ago, the operational efficiency and stability gained through their use have…”
Get full text
Conference Proceeding -
12
Analyses of Two End-User Software Vulnerability Ex
Published in Information security technical report (01-05-2013)“…Understanding the exposure risk because of softwar…”
Get full text
Journal Article -
13
Optimal placement of Phasor Measurement Units in power grids using Memetic Algorithms
Published in 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE) (01-06-2014)“…Wide area monitoring, protection and control for power network systems are one of the fundamental components of the smart grid concept. Synchronized…”
Get full text
Conference Proceeding -
14
Analyses of two end-user software vulnerability exposure metrics (extended version)
Published in Information security technical report (01-05-2013)“…Understanding the exposure risk of software vulnerabilities is an important part of the software ecosystem. Reliable software vulnerability metrics allow…”
Get full text
Journal Article -
15
Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server
Published in 2013 International Conference on Availability, Reliability and Security (01-09-2013)“…Software vulnerabilities are an important part of the modern software economy. Being able to accurately classify software defects as a vulnerability, or not,…”
Get full text
Conference Proceeding -
16
Multi-criteria based staging of Optimal PMU Placement using Fuzzy Weighted Average
Published in 2013 IEEE International Symposium on Industrial Electronics (01-05-2013)“…In this paper, a multi-criteria based two step method for Optimal PMU Placement (OPP) using Fuzzy Weighted Average (FWA) is proposed. In the first step, a…”
Get full text
Conference Proceeding -
17
Deception used for cyber defense of control systems
Published in 2009 2nd Conference on Human System Interactions (01-05-2009)“…Control system cyber security defense mechanisms may employ deception in human system interactions to make it more difficult for attackers to plan and execute…”
Get full text
Conference Proceeding -
18
A temporal-spatial data fusion architecture for monitoring complex systems
Published in 3rd International Conference on Human System Interaction (01-05-2010)“…Non-homogenous systems arise from the need to incorporate a variety of disparate systems into a cohesive functioning whole and may comprise many crucial…”
Get full text
Conference Proceeding -
19
Analyses of Two End-User Software Vulnerability Exposure Metrics
Published in 2012 Seventh International Conference on Availability, Reliability and Security (01-08-2012)“…The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of…”
Get full text
Conference Proceeding