Juan Lopez Jr.

Orcid: 0000-0001-5083-8627

According to our database1, Juan Lopez Jr. authored at least 24 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE.
Int. J. Crit. Infrastructure Prot., September, 2023

Design of a Novel Information System for Semi-automated Management of Cybersecurity in Industrial Control Systems.
ACM Trans. Manag. Inf. Syst., March, 2023

Impact of Grammar on Language Model Comprehension.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

A Testbed for Evaluating Performance and Cybersecurity Implications of IEC-61850 GOOSE Hardware Implementations.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
An Accuracy-Maximization Approach for Claims Classifiers in Document Content Analytics for Cybersecurity.
J. Cybersecur. Priv., June, 2022

Memory forensic analysis of a programmable logic controller in industrial control systems.
Digit. Investig., 2022

2021
CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model.
J. Cybersecur. Priv., November, 2021

JTAG-based PLC memory acquisition framework for industrial control systems.
Digit. Investig., 2021

2019
Automated Reconstruction of Control Logic for Programmable Logic Controller Forensics.
Proceedings of the Information Security - 22nd International Conference, 2019

Kensor: Coordinated Intelligence from Co-Located Sensors.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features.
IEEE Trans. Inf. Forensics Secur., 2018

2016
A framework for incorporating insurance in critical infrastructure cyber risk strategies.
Int. J. Crit. Infrastructure Prot., 2016

Using timing-based side channels for anomaly detection in industrial control systems.
Int. J. Crit. Infrastructure Prot., 2016

Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment.
Proceedings of the Critical Infrastructure Protection X, 2016

Practical Application Layer Emulation in Industrial Control System Honeypots.
Proceedings of the Critical Infrastructure Protection X, 2016

Conditional Constellation Based-Distinct Native Attribute (CB-DNA) fingerprinting for network device authentication.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Constructing cost-effective and targetable industrial control system honeypots for production networks.
Int. J. Crit. Infrastructure Prot., 2015

A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2014
Evaluation of security solutions in the SCADA environment.
Data Base, 2014

Exploitation of HART Wired Signal Distinct Native Attribute (WS-DNA) Features to Verify Field Device Identity and Infer Operating State.
Proceedings of the Critical Information Infrastructures Security, 2014

2013
Firmware modification attacks on programmable logic controllers.
Int. J. Crit. Infrastructure Prot., 2013

Design and Implementation of Industrial Control System Emulators.
Proceedings of the Critical Infrastructure Protection VII, 2013

2012
Quantifying Controller Resilience Using Behavior Characterization.
Proceedings of the Critical Infrastructure Protection VI, 2012

2010
Engineering Mission Assurance for the Cyber Security of Supervisory Control and Data Aquisition (SCADA) Systems.
Proceedings of the 2010 International Conference on Security & Management, 2010


  Loading...