John Henry Castellanos
Orcid: 0000-0003-3368-400X
According to our database1,
John Henry Castellanos
authored at least 16 papers
between 2016 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Selective Encryption Framework for Securing Communication in Industrial Control Systems.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023
2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
2020
Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020
2019
Evaluating Cascading Effects of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
CoRR, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016