Stephen D. Wolthusen
According to our database1,
Stephen D. Wolthusen
authored at least 156 papers
between 1999 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2023
Proceedings of the Critical Infrastructure Protection XVII, 2023
Proceedings of the Critical Information Infrastructures Security, 2023
2022
Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus.
Int. J. Crit. Infrastructure Prot., 2022
2021
Int. J. Crit. Infrastructure Prot., 2021
2020
Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection.
Proceedings of the Entwicklungen, 2020
Proceedings of the International Conference on Computing, Networking and Communications, 2020
Proceedings of the 16th International Conference on the Design of Reliable Communication Networks, 2020
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection.
Proceedings of the 12th International Conference on Cyber Conflict, 2020
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Proceedings of the 17th European Control Conference, 2019
Proceedings of the 2019 American Control Conference, 2019
Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
The Design and Classification of Cheating Attacks on Power Marketing Schemes in Resource Constrained Smart Micro-Grids.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018
Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2018
Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2018
Proceedings of the Critical Infrastructure Protection XII, 2018
Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution.
Proceedings of the Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living, 2018
A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements.
Proceedings of the Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living, 2018
Proceedings of the 15th IEEE International Conference on Networking, Sensing and Control, 2018
Proceedings of the Critical Information Infrastructures Security, 2018
Proceedings of the Critical Information Infrastructures Security, 2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
2017
J. Inf. Secur. Appl., 2017
Proceedings of the Computer Network Security, 2017
Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2017
Reactive/proactive connectivity management in a tactical service-oriented infrastructure.
Proceedings of the International Conference on Military Communications and Information Systems, 2017
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017
De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol.
Proceedings of the Critical Information Infrastructures Security, 2017
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Policy enforcement system for secure interoperable control in distributed Smart Grid systems.
J. Netw. Comput. Appl., 2016
Proceedings of the International Conference on Security of Smart Cities, 2016
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Proceedings of the Critical Infrastructure Protection X, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the Future Network Systems and Security - Second International Conference, 2016
Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol.
Proceedings of the Critical Information Infrastructures Security, 2016
Proceedings of the Critical Information Infrastructures Security, 2016
Proceedings of the Critical Information Infrastructures Security, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
2015
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015
Distributed security policies for service-oriented architectures over tactical networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids.
Proceedings of the 2015 IEEE Innovative Smart Grid Technologies, 2015
Inferring relevance and presence of evidence in service-oriented and SaaS architectures.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
Proceedings of the 2015 Global Information Infrastructure and Networking Symposium, 2015
Proceedings of the Future Network Systems and Security - First International Conference, 2015
Proceedings of the 11th International Conference on the Design of Reliable Communication Networks, 2015
A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids.
Proceedings of the Critical Information Infrastructures Security, 2015
Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes.
Proceedings of the Critical Information Infrastructures Security, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014
Dynamic forced partitioning of robust hierarchical state estimators for power networks.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014
Proceedings of the Critical Infrastructure Protection VIII, 2014
Proceedings of the Critical Infrastructure Protection VIII, 2014
Reconstruction of structural controllability over Erdős-Rényi graphs via power dominating sets.
Proceedings of the Cyber and Information Security Research Conference, 2014
Proceedings of the Critical Information Infrastructures Security, 2014
Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use.
Proceedings of the Critical Information Infrastructures Security, 2014
Proceedings of the Communications and Multimedia Security, 2014
Proceedings of the Communications and Multimedia Security, 2014
2013
Int. J. Crit. Infrastructures, 2013
Proceedings of the 2nd IEEE Network Science Workshop, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs.
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the 2013 Information Security for South Africa, 2013
Malicious false data injection in hierarchical electric power grid state estimation systems.
Proceedings of the Fourth International Conference on Future Energy Systems, 2013
Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal.
Proceedings of the Critical Information Infrastructures Security, 2013
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013
2012
Proceedings of the Critical Infrastructure Protection, 2012
Algorithmic approach for clandestine localisation and tracking in short-range environments.
Int. J. Commun. Networks Distributed Syst., 2012
Proceedings of the 2012 Information Security for South Africa, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the Critical Infrastructure Protection VI, 2012
Detecting anomalies in IaaS environments through virtual machine host system call analysis.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Critical Infrastructure Protection V, 2011
Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation.
Proceedings of the Critical Information Infrastructure Security, 2011
2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation.
Proceedings of the Information Security South Africa Conference 2010, 2010
Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic Topology Information.
Proceedings of the Information Security South Africa Conference 2010, 2010
Proceedings of the Information Security, 2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the Critical Infrastructure Protection IV, 2010
Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments.
Proceedings of the Critical Infrastructure Protection IV, 2010
On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Proceedings of the Critical Information Infrastructures Security, 2010
Proceedings of the Communications and Multimedia Security, 2010
Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism.
Proceedings of the ARES 2010, 2010
2009
Integrating Information Security with Information System Architecture and Administration Curricula.
Proceedings of the Information Security South Africa Conference 2009, 2009
Proceedings of the IMF 2009, 2009
Proceedings of the IMF 2009, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Information Assurance and Security Education and Training, 2009
Proceedings of the Critical Infrastructure Protection III, 2009
Proceedings of the Image Analysis and Recognition, 6th International Conference, 2009
A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009
Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance.
Proceedings of the Advances in Biometrics, Third International Conference, 2009
Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Network Forensics of Partial SSL/TLS Encrypted Traffic Classification Using Clustering Algorithms.
Proceedings of the IT-Incidents Management & IT-Forensics, 2008
Using Observations of Invariant Behaviour to Detect Malicious Agency in Distributed Environments.
Proceedings of the IT-Incidents Management & IT-Forensics, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the Critical Infrastructure Protection II, 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
2007
Inf. Secur. Tech. Rep., 2007
Connectivity models of interdependency in mixed-type critical infrastructure networks.
Inf. Secur. Tech. Rep., 2007
Vertrauenswürdige Protokollierung - Protokollierung mittels nicht-deterministischer nebenläufiger wechselseitiger Überwachung.
Datenschutz und Datensicherheit, 2007
Proceedings of the Fifth World Conference on Information Security Education, 2007
Proceedings of the Critical Infrastructure Protection, 2007
A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Proceedings of the Inter-Domain Management, 2007
2006
Datenschutz und Datensicherheit, 2006
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006
Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006
2005
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
2003
PhD thesis, 2003
A Distributed Multipurpose Mail Guard (Blinded).
Proceedings of the IEEE Systems, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
Techniques and Applications of Digital Watermarking and Content Protection.
Artech House computer security series, Artech House, ISBN: 978-1-58053-111-5, 2003
2002
ACM SIGOPS Oper. Syst. Rev., 2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
2001
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001
Transparent Access To Encrypted Data Using Operating System Network Stack Extensions.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
1999
IEEE Computer Graphics and Applications, 1999