Joseph Gardiner

Orcid: 0000-0003-4748-4228

According to our database1, Joseph Gardiner authored at least 27 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Threat models over space and time: A case study of end-to-end-encrypted messaging applications.
Softw. Pract. Exp., 2024

Time-to-Lie: Identifying Industrial Control System Honeypots Using the Internet Control Message Protocol.
CoRR, 2024

Capture The Industrial Flag: Lessons from hosting an ICS cybersecurity exercise.
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024

"If You Build it, They will Come" - A Blueprint for ICS-focused Capture-The-Flag Competitions.
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024

2023
Decisions & Disruptions 2: Decide Harder.
CoRR, 2023

Threat Models over Space and Time: A Case Study of E2EE Messaging Applications.
CoRR, 2023

Towards Human-Centric Endpoint Security.
Proceedings of the Security Protocols XXVIII, 2023

A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

The Internet of Insecure Cows - A Security Analysis of Wireless Smart Devices Used for Dairy Farming.
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 2023

2022
A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools.
CoRR, 2022

Old MacDonald had a smart farm: Building a testbed to study cybersecurity in smart dairy farming.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

Security Threats in Electric Vehicle Charging.
Proceedings of the IEEE International Conference on Communications, 2022

Adaptive Cyber Security for Critical Infrastructure.
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022

Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2022

SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Building a Privacy Testbed: Use Cases and Design Considerations.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021

2020
Technical Report: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs.
CoRR, 2020

Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

DEMO: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

2019
Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2019

Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

2016
On the Security of Machine Learning in Malware C&C Detection: A Survey.
ACM Comput. Surv., 2016

Discordant patient pain level reporting between questionnaires and physician encounters of the same day.
Proceedings of the AMIA 2016, 2016

2014
Blindspot: Indistinguishable Anonymous Communications.
CoRR, 2014

Command & Control: Understanding, Denying and Detecting.
CoRR, 2014

On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis.
Proceedings of the Security Protocols XXII, 2014


  Loading...