Julian L. Rrushi
Orcid: 0000-0003-2291-0665
According to our database1,
Julian L. Rrushi
authored at least 44 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cse.wwu.edu
On csauthors.net:
Bibliography
2024
Int. J. Crit. Infrastructure Prot., 2024
2023
2022
ACM Trans. Embed. Comput. Syst., 2022
Design and Emulation of Physics-Centric Cyberattacks on an Electrical Power Transformer.
IEEE Access, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Clustering Application for Data-Driven Prediction of Health Insurance Premiums for People of Different Ages.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
2020
Protecting Location Privacy for Crowd Workers in Spatial Crowdsourcing Using a Novel Dummy-Based Mechanism.
IEEE Access, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the 3rd International Conference on Information and Computer Technologies, 2020
Proceedings of the IEEE Intl Conf on Dependable, 2020
Proceedings of the IEEE Intl Conf on Dependable, 2020
2019
Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency.
Proceedings of the First IEEE International Conference on Trust, 2019
Proceedings of the First IEEE International Conference on Trust, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
Multi-range Decoy I/O Defense of Electrical Substations Against Industrial Control System Malware.
Proceedings of the Resilience of Cyber-Physical Systems, 2019
2018
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
2017
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
Proceedings of the Critical Infrastructure Protection XI, 2017
Proceedings of the 3rd Annual Industrial Control System Security Workshop, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Defending Electrical Substations Against 0-Day Malware Through Decoy I/O in Protective Relays.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
2016
Comput. Secur., 2016
2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015
2014
A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management.
J. Comput. Virol. Hacking Tech., 2014
IEEE Secur. Priv., 2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
2012
Proceedings of the Critical Infrastructure Protection, 2012
2011
Int. J. Inf. Comput. Secur., 2011
Int. J. Crit. Infrastructure Prot., 2011
A Bayesian theory of confirmation for intrusion report fusion in process control networks.
Int. J. Crit. Comput. Based Syst., 2011
Estimating botnet virulence within mathematical models of botnet propagation dynamics.
Comput. Secur., 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2009
Proceedings of the Critical Infrastructure Protection III, 2009
2008
A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Critical Infrastructure Protection II, 2008
Proceedings of the Critical Infrastructure Protection II, 2008
2005
Proceedings of the Neural Nets, 16th Italian Workshop on Neural Nets, 2005