Alvaro A. Cárdenas
Orcid: 0000-0002-5142-9750Affiliations:
- University of California, Santa Cruz, CA, USA
- University of Texas, Dallas, TX, USA (former)
- University of California, Berkeley, CA, USA (former)
According to our database1,
Alvaro A. Cárdenas
authored at least 144 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on utdallas.edu
On csauthors.net:
Bibliography
2024
Proc. ACM Meas. Anal. Comput. Syst., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 30th IEEE Real-Time and Embedded Technology and Applications Symposium, 2024
By the Numbers: Towards Standard Evaluation Metrics for Programmable Logic Controllers' Defenses.
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024
From Power to Water: Dissecting SCADA Networks Across Different Critical Infrastructures.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024
Ghost in the SAM: Stealthy, Robust, and Privileged Persistence through Invisible Accounts.
Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2024
2023
Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990-2018.
Int. J. Crit. Infrastructure Prot., September, 2023
IEEE Commun. Mag., June, 2023
IEEE Trans. Cybern., May, 2023
Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review.
ACM Comput. Surv., 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
An Observer-based Switching Algorithm for Safety under Sensor Denial-of-Service Attacks.
Proceedings of the American Control Conference, 2023
2022
Dagstuhl Reports, 2022
A fast and accurate threat detection and prevention architecture using stream processing.
Concurr. Comput. Pract. Exp., 2022
On the Stability of Cyber-Physical Control Systems With Sensor Multiplicative Attacks.
IEEE Access, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network.
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Fuzzing Malicious Driving Behavior to find Vulnerabilities in Collision Avoidance Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 61st IEEE Conference on Decision and Control, 2022
Private Anomaly Detection in Linear Controllers: Garbled Circuits vs. Homomorphic Encryption.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022
Sampling-based Computation of Viability Domain to Prevent Safety Violations by Attackers.
Proceedings of the IEEE Conference on Control Technology and Applications, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021
2020
IEEE Trans. Ind. Informatics, 2020
ACM Trans. Cyber Phys. Syst., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 41st IEEE Real-Time Systems Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
The more the merrier: adding hidden measurements to secure industrial control systems.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020
DARIA: Designing Actuators to Resist Arbitrary Attacks Against Cyber-Physical Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the Dynamic Data Driven Applications Systems, 2020
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020
2019
IEEE Trans. Ind. Informatics, 2019
Int. J. Crit. Infrastructure Prot., 2019
Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices.
IEEE Secur. Priv., 2019
Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019
Proceedings of the 2019 American Control Conference, 2019
Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
Proceedings of the Applied Cryptography and Network Security, 2019
Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detection.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
Proceedings of the Handbook of Dynamic Data Driven Applications Systems., 2018
ACM Trans. Cyber Phys. Syst., 2018
Leveraging Software-Defined Networking for Incident Response in Industrial Control Systems.
IEEE Softw., 2018
ACM Comput. Surv., 2018
ALERT: Adding a Secure Layer in Decision Support for Advanced Driver Assistance System (ADAS).
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018
A Virtual Environment for Industrial Control Systems: A Nonlinear Use-Case in Attack Detection, Identification, and Response.
Proceedings of the 4th Annual Industrial Control System Security Workshop, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Conference on Control Technology and Applications, 2018
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018
Proceedings of the 2018 Annual American Control Conference, 2018
2017
Proceedings of the Guide to Security in SDN and NFV, 2017
IEEE Trans. Smart Grid, 2017
IEEE Des. Test, 2017
IEEE Des. Test, 2017
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017
Proceedings of the IEEE Conference on Control Technology and Applications, 2017
Proceedings of the IEEE Conference on Control Technology and Applications, 2017
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017
Understanding Security Threats in Consumer Drones Through the Lens of the Discovery Quadcopter Family.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017
Proceedings of the 2017 American Control Conference, 2017
Security vs. privacy: How integrity attacks can be masked by the noise of differential privacy.
Proceedings of the 2017 American Control Conference, 2017
2016
IEEE Internet Comput., 2016
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
A multi-layered and kill-chain based security analysis framework for cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2015
How the quantity and quality of training data impacts re-identification of smart meter users?
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015
Proceedings of the 54th IEEE Conference on Decision and Control, 2015
First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Incentives for demand-response programs with nonlinear, piece-wise continuous electricity cost functions.
Proceedings of the American Control Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures.
IEEE Trans. Smart Grid, 2014
Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks.
Int. J. Crit. Infrastructure Prot., 2014
IEEE Secur. Priv., 2014
CoRR, 2014
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Proceedings of the Critical Infrastructure Protection VIII, 2014
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014
From CRCs to resilient control systems: differentiating between reliability and security for the protection of cyber-physical systems.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014
Delay and sampling independence of a consensus algorithm and its application to smart grid privacy.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014
CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013
Proceedings of the Critical Infrastructure Protection VII, 2013
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
2012
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
A game theory model for electricity theft detection and privacy-aware control in AMI systems.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012
2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010
2009
Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments.
IEEE/ACM Trans. Netw., 2009
Int. J. Crit. Infrastructure Prot., 2009
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems.
Ad Hoc Networks, 2009
Proceedings of the Hybrid Systems: Computation and Control, 12th International Conference, 2009
2008
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Principled reasoning and practical applications of alert fusion in intrusion detection systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers.
J. Comput. Secur., 2007
Proceedings of the Advances in Neural Information Processing Systems 20, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the International Conference on Image Processing, 2007
Towards Optimal Design of Data Hiding Algorithms Against Nonparametric Adversary Models.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007
2006
PhD thesis, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006
Proceedings of the Proceedings, 2006
2004
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
Proceedings of the 2004 American Control Conference, 2004