default search action
BibTeX records: Thomas H. Morris
@inproceedings{DBLP:conf/secrypt/SheldonBPM25,
author = {Jared Sheldon and
Isabelle Brown{-}Cantrell and
Patrick Pape and
Thomas H. Morris},
editor = {Sabrina De Capitani di Vimercati and
Pierangela Samarati},
title = {Highlighting Vulnerabilities in a Genomics Biocybersecurity Lab Through
Threat Modeling and Security Testing},
booktitle = {Proceedings of the 22nd International Conference on Security and Cryptography,
{SECRYPT} 2025, Bilbao, Spain, June 11-13, 2025},
pages = {626--631},
publisher = {{SCITEPRESS}},
year = {2025},
url = {https://doi.org/10.5220/0013523800003979},
doi = {10.5220/0013523800003979},
timestamp = {Tue, 22 Jul 2025 15:34:12 +0200},
biburl = {https://dblp.org/rec/conf/secrypt/SheldonBPM25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/SheldonRMBZPW24,
author = {Jared Sheldon and
Scott Ross and
Thomas H. Morris and
Isabelle Brown and
Feng Zhu and
Patrick Pape and
Phillip Whitlow},
title = {Genomics Cybersecurity Concerns, Challenges, and a Modular Test Lab},
booktitle = {Proceedings of the 2024 {ACM} Southeast Conference, {ACM} {SE} 2024,
Marietta, GA, USA, April 18-20, 2024},
pages = {86--94},
publisher = {{ACM}},
year = {2024},
url = {https://doi.org/10.1145/3603287.3651215},
doi = {10.1145/3603287.3651215},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ACMse/SheldonRMBZPW24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/PuckettLYM23,
author = {Steven Puckett and
Jianqing Liu and
Seong{-}Moo Yoo and
Thomas H. Morris},
title = {A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware
Accelerators},
journal = {{IEEE} Internet Things J.},
volume = {10},
number = {24},
pages = {22143--22152},
year = {2023},
url = {https://doi.org/10.1109/JIOT.2023.3304175},
doi = {10.1109/JIOT.2023.3304175},
timestamp = {Sat, 13 Jan 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iotj/PuckettLYM23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ncs/2021,
editor = {Kim{-}Kwang Raymond Choo and
Tommy H. Morris and
Gilbert L. Peterson and
Eric S. Imsand},
title = {National Cyber Summit {(NCS)} Research Track 2021, Huntsville, AL,
USA, September 28-30, 2021},
series = {Lecture Notes in Networks and Systems},
volume = {310},
publisher = {Springer},
year = {2022},
url = {https://doi.org/10.1007/978-3-030-84614-5},
doi = {10.1007/978-3-030-84614-5},
isbn = {978-3-030-84613-8},
timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ncs/2021.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/AlimWM21,
author = {Mohammad E. Alim and
Shelton R. Wright and
Tommy H. Morris},
title = {A Laboratory-Scale Canal {SCADA} System Testbed for Cybersecurity
Research},
booktitle = {3rd {IEEE} International Conference on Trust, Privacy and Security
in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta,
GA, USA, December 13-15, 2021},
pages = {348--354},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/TPSISA52974.2021.00038},
doi = {10.1109/TPSISA52974.2021.00038},
timestamp = {Thu, 21 Apr 2022 16:21:01 +0200},
biburl = {https://dblp.org/rec/conf/tpsisa/AlimWM21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ncs/2020,
editor = {Kim{-}Kwang Raymond Choo and
Tommy H. Morris and
Gilbert L. Peterson and
Eric S. Imsand},
title = {National Cyber Summit {(NCS)} Research Track 2020, Huntsville, AL,
USA, June 2-4, 2020},
series = {Advances in Intelligent Systems and Computing},
volume = {1271},
publisher = {Springer},
year = {2021},
url = {https://doi.org/10.1007/978-3-030-58703-1},
doi = {10.1007/978-3-030-58703-1},
isbn = {978-3-030-58702-4},
timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ncs/2020.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ncs/2019,
editor = {Kim{-}Kwang Raymond Choo and
Thomas H. Morris and
Gilbert L. Peterson},
title = {National Cyber Summit, {NCS} 2019, Research Track, Huntsville, AL,
USA, 4-6 June, 2019},
series = {Advances in Intelligent Systems and Computing},
volume = {1055},
publisher = {Springer},
year = {2020},
url = {https://doi.org/10.1007/978-3-030-31239-8},
doi = {10.1007/978-3-030-31239-8},
isbn = {978-3-030-31238-1},
timestamp = {Sun, 19 Jul 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ncs/2019.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/TalukderKRMR19,
author = {Bashir M. Sabquat Bahar Talukder and
Joseph Kerns and
Biswajit Ray and
Thomas H. Morris and
Md. Tauhidur Rahman},
title = {Exploiting {DRAM} Latency Variations for Generating True Random Numbers},
booktitle = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2019,
Las Vegas, NV, USA, January 11-13, 2019},
pages = {1--6},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/ICCE.2019.8662060},
doi = {10.1109/ICCE.2019.8662060},
timestamp = {Wed, 15 Feb 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iccel/TalukderKRMR19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncs/GriffithM19,
author = {SueAnne Griffith and
Thomas H. Morris},
editor = {Kim{-}Kwang Raymond Choo and
Thomas H. Morris and
Gilbert L. Peterson},
title = {Using Modeled Cyber-Physical Systems for Independent Review of Intrusion
Detection Systems},
booktitle = {National Cyber Summit, {NCS} 2019, Research Track, Huntsville, AL,
USA, 4-6 June, 2019},
series = {Advances in Intelligent Systems and Computing},
volume = {1055},
pages = {116--125},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-31239-8\_10},
doi = {10.1007/978-3-030-31239-8\_10},
timestamp = {Sun, 19 Jul 2020 19:11:29 +0200},
biburl = {https://dblp.org/rec/conf/ncs/GriffithM19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncs/WerthM19,
author = {Aaron Werth and
Thomas H. Morris},
editor = {Kim{-}Kwang Raymond Choo and
Thomas H. Morris and
Gilbert L. Peterson},
title = {A Specification-Based Intrusion Prevention System for Malicious Payloads},
booktitle = {National Cyber Summit, {NCS} 2019, Research Track, Huntsville, AL,
USA, 4-6 June, 2019},
series = {Advances in Intelligent Systems and Computing},
volume = {1055},
pages = {153--168},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-31239-8\_13},
doi = {10.1007/978-3-030-31239-8\_13},
timestamp = {Sun, 19 Jul 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ncs/WerthM19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlvesDWM18,
author = {Thiago Alves and
Rishabh Das and
Aaron Werth and
Thomas H. Morris},
title = {Virtualization of {SCADA} testbeds for cybersecurity research: {A}
modular approach},
journal = {Comput. Secur.},
volume = {77},
pages = {531--546},
year = {2018},
url = {https://doi.org/10.1016/j.cose.2018.05.002},
doi = {10.1016/J.COSE.2018.05.002},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/compsec/AlvesDWM18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlvesM18,
author = {Thiago Alves and
Thomas H. Morris},
title = {OpenPLC: An {IEC} 61, 131-3 compliant open source industrial controller
for cyber security research},
journal = {Comput. Secur.},
volume = {78},
pages = {364--379},
year = {2018},
url = {https://doi.org/10.1016/j.cose.2018.07.007},
doi = {10.1016/J.COSE.2018.07.007},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/compsec/AlvesM18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/esl/AlvesDM18,
author = {Thiago Alves and
Rishabh Das and
Thomas H. Morris},
title = {Embedding Encryption and Machine Learning Intrusion Prevention Systems
on Programmable Logic Controllers},
journal = {{IEEE} Embed. Syst. Lett.},
volume = {10},
number = {3},
pages = {99--102},
year = {2018},
url = {https://doi.org/10.1109/LES.2018.2823906},
doi = {10.1109/LES.2018.2823906},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/esl/AlvesDM18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/AdhikariMP18,
author = {Uttam Adhikari and
Thomas H. Morris and
Shengyi Pan},
title = {Applying Non-Nested Generalized Exemplars Classification for Cyber-Power
Event and Intrusion Detection},
journal = {{IEEE} Trans. Smart Grid},
volume = {9},
number = {5},
pages = {3928--3941},
year = {2018},
url = {https://doi.org/10.1109/TSG.2016.2642787},
doi = {10.1109/TSG.2016.2642787},
timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tsg/AdhikariMP18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/AdhikariMP18a,
author = {Uttam Adhikari and
Thomas H. Morris and
Shengyi Pan},
title = {Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event
and Intrusion Classification},
journal = {{IEEE} Trans. Smart Grid},
volume = {9},
number = {5},
pages = {4049--4060},
year = {2018},
url = {https://doi.org/10.1109/TSG.2017.2647778},
doi = {10.1109/TSG.2017.2647778},
timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tsg/AdhikariMP18a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/Lingasubramanian18,
author = {Karthikeyan Lingasubramanian and
Ranveer Kumar and
Nagendra Babu Gunti and
Thomas H. Morris},
title = {Study of hardware trojans based security vulnerabilities in cyber
physical systems},
booktitle = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2018,
Las Vegas, NV, USA, January 12-14, 2018},
pages = {1--6},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/ICCE.2018.8326180},
doi = {10.1109/ICCE.2018.8326180},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iccel/Lingasubramanian18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlvesM18,
author = {Thiago Alves and
Thomas H. Morris},
editor = {Paolo Mori and
Steven Furnell and
Olivier Camp},
title = {Hardware-based Cyber Threats},
booktitle = {Proceedings of the 4th International Conference on Information Systems
Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
January 22-24, 2018},
pages = {259--266},
publisher = {SciTePress},
year = {2018},
url = {https://doi.org/10.5220/0006577202590266},
doi = {10.5220/0006577202590266},
timestamp = {Thu, 20 Jan 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icissp/AlvesM18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/DasM18,
author = {Rishabh Das and
Thomas H. Morris},
editor = {Jason Staggs and
Sujeet Shenoi},
title = {Modeling a Midstream Oil Terminal for Cyber Security Risk Evaluation},
booktitle = {Critical Infrastructure Protection {XII} - 12th {IFIP} {WG} 11.10
International Conference, {ICCIP} 2018, Arlington, VA, USA, March
12-14, 2018, Revised Selected Papers},
series = {{IFIP} Advances in Information and Communication Technology},
volume = {542},
pages = {149--175},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-030-04537-1\_9},
doi = {10.1007/978-3-030-04537-1\_9},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ifip11-10/DasM18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icss2/2018,
editor = {Sajal Bhatia and
Alvaro A. C{\'{a}}rdenas and
Ernest Foo and
Marina Krotofil and
Sye Loong Keoh and
Thomas Locher and
Daisuke Mashima and
Tommy H. Morris and
John Mulder and
Stephen McLaughlin and
Igor Nai Fovino and
Julian L. Rrushi and
Bradley L. Schatz and
Jared Smith and
Saman A. Zonouz and
Tim Zimmerman},
title = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
{ICSS} 2018, San Juan, PR, USA, December 4, 2018},
publisher = {{ACM}},
year = {2018},
url = {https://dl.acm.org/citation.cfm?id=3295453},
isbn = {978-1-4503-6220-7},
timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icss2/2018.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-02068,
author = {Bashir M. Sabquat Bahar Talukder and
Joseph Kerns and
Biswajit Ray and
Thomas H. Morris and
Md. Tauhidur Rahman},
title = {Exploiting {DRAM} Latency Variations for Generating True Random Numbers},
journal = {CoRR},
volume = {abs/1808.02068},
year = {2018},
url = {http://arxiv.org/abs/1808.02068},
eprinttype = {arXiv},
eprint = {1808.02068},
timestamp = {Wed, 15 Feb 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-1808-02068.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ShermanDCCMOSTV17,
author = {Alan T. Sherman and
Melissa Dark and
Agnes H. Chan and
Rylan Chong and
Thomas H. Morris and
Linda Oliva and
John A. Springer and
Bhavani Thuraisingham and
Christopher Vatcher and
Rakesh M. Verma and
Susanne Wetzel},
title = {INSuRE: Collaborating Centers of Academic Excellence Engage Students
in Cybersecurity Research},
journal = {{IEEE} Secur. Priv.},
volume = {15},
number = {4},
pages = {72--78},
year = {2017},
url = {https://doi.org/10.1109/MSP.2017.3151327},
doi = {10.1109/MSP.2017.3151327},
timestamp = {Sun, 04 Aug 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieeesp/ShermanDCCMOSTV17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/AdhikariMP17,
author = {Uttam Adhikari and
Thomas H. Morris and
Shengyi Pan},
title = {{WAMS} Cyber-Physical Test Bed for Power System, Cybersecurity Study,
and Data Mining},
journal = {{IEEE} Trans. Smart Grid},
volume = {8},
number = {6},
pages = {2744--2753},
year = {2017},
url = {https://doi.org/10.1109/TSG.2016.2537210},
doi = {10.1109/TSG.2016.2537210},
timestamp = {Sun, 22 May 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tsg/AdhikariMP17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/0001MY17,
author = {Thiago Alves and
Thomas H. Morris and
Seong{-}Moo Yoo},
title = {Securing {SCADA} Applications Using OpenPLC With End-To-End Encryption},
booktitle = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
{ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
pages = {1--6},
publisher = {{ACM}},
year = {2017},
url = {https://doi.org/10.1145/3174776.3174777},
doi = {10.1145/3174776.3174777},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icss2/0001MY17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShermanDCCMOSTV17,
author = {Alan T. Sherman and
Melissa Dark and
Agnes H. Chan and
Rylan Chong and
Thomas H. Morris and
Linda Oliva and
John A. Springer and
Bhavani Thuraisingham and
Christopher Vatcher and
Rakesh M. Verma and
Susanne Wetzel},
title = {The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity
Research},
journal = {CoRR},
volume = {abs/1703.08859},
year = {2017},
url = {http://arxiv.org/abs/1703.08859},
eprinttype = {arXiv},
eprint = {1703.08859},
timestamp = {Wed, 26 Jun 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/ShermanDCCMOSTV17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/ChenTAMS16,
author = {Qian Chen and
Madhulika Trivedi and
Sherif Abdelwahed and
Thomas H. Morris and
Frederick T. Sheldon},
title = {Model-based autonomic security management for cyber-physical infrastructures},
journal = {Int. J. Crit. Infrastructures},
volume = {12},
number = {4},
pages = {273--294},
year = {2016},
url = {https://doi.org/10.1504/IJCIS.2016.10002316},
doi = {10.1504/IJCIS.2016.10002316},
timestamp = {Thu, 20 Jan 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijcritis/ChenTAMS16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/VaughnM16,
author = {Rayford B. Vaughn Jr. and
Tommy H. Morris},
editor = {Joseph P. Trien and
Stacy J. Prowell and
John R. Goodall and
Robert A. Bridges},
title = {Addressing Critical Industrial Control System Cyber Security Concerns
via High Fidelity Simulation},
booktitle = {Proceedings of the 11th Annual Cyber and Information Security Research
Conference, {CISRC} 2016, Oak Ridge, TN, USA, April 5-7, 2016},
pages = {12:1--12:4},
publisher = {{ACM}},
year = {2016},
url = {https://doi.org/10.1145/2897795.2897819},
doi = {10.1145/2897795.2897819},
timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/csiirw/VaughnM16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/0001DM16,
author = {Thiago Alves and
Rishabh Das and
Thomas H. Morris},
title = {Virtualization of Industrial Control System Testbeds for Cybersecurity},
booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
{ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
pages = {10--14},
publisher = {{ACM}},
year = {2016},
url = {https://doi.org/10.1145/3018981.3018988},
doi = {10.1145/3018981.3018988},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icss2/0001DM16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PanMA15,
author = {Shengyi Pan and
Thomas H. Morris and
Uttam Adhikari},
title = {A Specification-based Intrusion Detection Framework for Cyber-physical
Environment in Electric Power System},
journal = {Int. J. Netw. Secur.},
volume = {17},
number = {2},
pages = {174--188},
year = {2015},
url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p174-188.pdf},
timestamp = {Mon, 04 Jan 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijnsec/PanMA15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/PanMA15,
author = {Shengyi Pan and
Thomas H. Morris and
Uttam Adhikari},
title = {Classification of Disturbances and Cyber-Attacks in Power Systems
Using Heterogeneous Time-Synchronized Data},
journal = {{IEEE} Trans. Ind. Informatics},
volume = {11},
number = {3},
pages = {650--662},
year = {2015},
url = {https://doi.org/10.1109/TII.2015.2420951},
doi = {10.1109/TII.2015.2420951},
timestamp = {Thu, 21 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tii/PanMA15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/PanMA15,
author = {Shengyi Pan and
Thomas H. Morris and
Uttam Adhikari},
title = {Developing a Hybrid Intrusion Detection System Using Data Mining for
Power Systems},
journal = {{IEEE} Trans. Smart Grid},
volume = {6},
number = {6},
pages = {3104--3113},
year = {2015},
url = {https://doi.org/10.1109/TSG.2015.2409775},
doi = {10.1109/TSG.2015.2409775},
timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tsg/PanMA15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/ThorntonM15,
author = {Zach Thornton and
Thomas H. Morris},
editor = {Mason Rice and
Sujeet Shenoi},
title = {Enhancing a Virtual {SCADA} Laboratory Using Simulink},
booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
Selected Papers},
series = {{IFIP} Advances in Information and Communication Technology},
volume = {466},
pages = {119--133},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-26567-4\_8},
doi = {10.1007/978-3-319-26567-4\_8},
timestamp = {Thu, 27 Jul 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ifip11-10/ThorntonM15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GaoM14,
author = {Wei Gao and
Thomas H. Morris},
title = {On Cyber Attacks and Signature Based Intrusion Detection for {MODBUS}
Based Industrial Control Systems},
journal = {J. Digit. Forensics Secur. Law},
volume = {9},
number = {1},
pages = {37--56},
year = {2014},
url = {https://doi.org/10.15394/jdfsl.2014.1162},
doi = {10.15394/JDFSL.2014.1162},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jdfsl/GaoM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/MorrisG14,
author = {Thomas H. Morris and
Wei Gao},
editor = {Jonathan Butts and
Sujeet Shenoi},
title = {Industrial Control System Traffic Data Sets for Intrusion Detection
Research},
booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10
International Conference, {ICCIP} 2014, Arlington, VA, USA, March
17-19, 2014, Revised Selected Papers},
series = {{IFIP} Advances in Information and Communication Technology},
volume = {441},
pages = {65--78},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-662-45355-1\_5},
doi = {10.1007/978-3-662-45355-1\_5},
timestamp = {Sun, 23 Dec 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ifip11-10/MorrisG14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/SrivastavaMEVPA13,
author = {Anurag Srivastava and
Thomas H. Morris and
Timothy Ernster and
Ceeman Vellaithurai and
Shengyi Pan and
Uttam Adhikari},
title = {Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete
Information},
journal = {{IEEE} Trans. Smart Grid},
volume = {4},
number = {1},
pages = {235--244},
year = {2013},
url = {https://doi.org/10.1109/TSG.2012.2232318},
doi = {10.1109/TSG.2012.2232318},
timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tsg/SrivastavaMEVPA13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/MorrisVS13,
author = {Thomas H. Morris and
Rayford B. Vaughn and
Elena Sitnikova},
editor = {Clark D. Thomborson and
Udaya Parampalli},
title = {Advances in the Protection of Critical Infrastructure by Improvement
in Industrial Control System Security},
booktitle = {Eleventh Australasian Information Security Conference, {AISC} 2013,
Adelaide, Australia, February 2013},
series = {{CRPIT}},
volume = {138},
pages = {67--76},
publisher = {Australian Computer Society},
year = {2013},
url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Morris.html},
timestamp = {Thu, 25 Jul 2019 14:09:43 +0200},
biburl = {https://dblp.org/rec/conf/auisc/MorrisVS13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/VaughnMS13,
author = {Rayford B. Vaughn and
Thomas H. Morris and
Elena Sitnikova},
editor = {Frederick T. Sheldon and
Annarita Giani and
Axel W. Krings and
Robert K. Abercrombie},
title = {Development {\&} expansion of an industrial control system security
laboratory and an international research collaboration},
booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
TN, USA, January 8-10, 2013},
pages = {18},
publisher = {{ACM}},
year = {2013},
url = {https://doi.org/10.1145/2459976.2459997},
doi = {10.1145/2459976.2459997},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/csiirw/VaughnMS13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/PanMAM13,
author = {Shengyi Pan and
Thomas H. Morris and
Uttam Adhikari and
Vahid Madani},
editor = {Frederick T. Sheldon and
Annarita Giani and
Axel W. Krings and
Robert K. Abercrombie},
title = {Causal event graphs cyber-physical system intrusion detection system},
booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
TN, USA, January 8-10, 2013},
pages = {40},
publisher = {{ACM}},
year = {2013},
url = {https://doi.org/10.1145/2459976.2460022},
doi = {10.1145/2459976.2460022},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/csiirw/PanMAM13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SpraberyMPAM13,
author = {Read Sprabery and
Thomas H. Morris and
Shengyi Pan and
Uttam Adhikari and
Vahid Madani},
editor = {Frederick T. Sheldon and
Annarita Giani and
Axel W. Krings and
Robert K. Abercrombie},
title = {Protocol mutation intrusion detection for synchrophasor communications},
booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
TN, USA, January 8-10, 2013},
pages = {41},
publisher = {{ACM}},
year = {2013},
url = {https://doi.org/10.1145/2459976.2460023},
doi = {10.1145/2459976.2460023},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/csiirw/SpraberyMPAM13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SheldonFMHGMDKW13,
author = {Frederick T. Sheldon and
Daniel Fetzer and
David O. Manz and
Jingshan Huang and
Stuart Goose and
Thomas H. Morris and
Jiangbo Dang and
Jonathan Kirsch and
Dong Wei},
editor = {Frederick T. Sheldon and
Annarita Giani and
Axel W. Krings and
Robert K. Abercrombie},
title = {Intrinsically resilient energy control systems},
booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
TN, USA, January 8-10, 2013},
pages = {63},
publisher = {{ACM}},
year = {2013},
url = {https://doi.org/10.1145/2459976.2460046},
doi = {10.1145/2459976.2460046},
timestamp = {Thu, 30 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/csiirw/SheldonFMHGMDKW13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/MorrisJVD13,
author = {Thomas H. Morris and
Bryan A. Jones and
Rayford B. Vaughn and
Yoginder S. Dandass},
title = {Deterministic Intrusion Detection Rules for {MODBUS} Protocols},
booktitle = {46th Hawaii International Conference on System Sciences, {HICSS} 2013,
Wailea, HI, USA, January 7-10, 2013},
pages = {1773--1781},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/HICSS.2013.174},
doi = {10.1109/HICSS.2013.174},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/hicss/MorrisJVD13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/MorrisG13,
author = {Thomas H. Morris and
Wei Gao},
editor = {Helge Janicke and
Kevin I. Jones},
title = {Industrial Control System Cyber Attacks},
booktitle = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
series = {Workshops in Computing},
publisher = {{BCS}},
year = {2013},
url = {http://ewic.bcs.org/content/ConWebDoc/51165},
timestamp = {Thu, 25 Aug 2016 11:36:27 +0200},
biburl = {https://dblp.org/rec/conf/ics-csr/MorrisG13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ReavesM12,
author = {Bradley Reaves and
Thomas H. Morris},
title = {Analysis and mitigation of vulnerabilities in short-range wireless
communications for industrial control systems},
journal = {Int. J. Crit. Infrastructure Prot.},
volume = {5},
number = {3-4},
pages = {154--174},
year = {2012},
url = {https://doi.org/10.1016/j.ijcip.2012.10.001},
doi = {10.1016/J.IJCIP.2012.10.001},
timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijcip/ReavesM12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ReavesM12,
author = {Bradley Reaves and
Thomas H. Morris},
title = {An open virtual testbed for industrial control system security research},
journal = {Int. J. Inf. Sec.},
volume = {11},
number = {4},
pages = {215--229},
year = {2012},
url = {https://doi.org/10.1007/s10207-012-0164-7},
doi = {10.1007/S10207-012-0164-7},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijisec/ReavesM12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/MorrisVD12,
author = {Thomas H. Morris and
Rayford B. Vaughn and
Yoginder S. Dandass},
title = {A Retrofit Network Intrusion Detection System for {MODBUS} {RTU} and
{ASCII} Industrial Control Systems},
booktitle = {45th Hawaii International International Conference on Systems Science
{(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui,
HI, {USA}},
pages = {2338--2345},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/HICSS.2012.78},
doi = {10.1109/HICSS.2012.78},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/hicss/MorrisVD12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stids/SheldonHDFGKMMW12,
author = {Frederick T. Sheldon and
Jingshan Huang and
Jiangbo Dang and
Daniel Fetzer and
Stuart Goose and
Jonathan Kirsch and
David O. Manz and
Thomas H. Morris and
Dong Wei},
editor = {Paulo Cesar G. da Costa and
Kathryn B. Laskey},
title = {Intrinsically Resilient Energy Control Systems},
booktitle = {Proceedings of the Seventh International Conference on Semantic Technologies
for Intelligence, Defense, and Security, Fairfax, VA, USA, October
23-26, 2012},
series = {{CEUR} Workshop Proceedings},
volume = {966},
pages = {96--103},
publisher = {CEUR-WS.org},
year = {2012},
url = {https://ceur-ws.org/Vol-966/STIDS2012\_T12\_SheldonEtAl\_ResilientEnergySystems.pdf},
timestamp = {Thu, 30 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/stids/SheldonHDFGKMMW12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MorrisSRGPR11,
author = {Thomas H. Morris and
Anurag Srivastava and
Bradley Reaves and
Wei Gao and
Kalyan Pavurapu and
Ram Reddi},
title = {A control system testbed to validate critical infrastructure protection
concepts},
journal = {Int. J. Crit. Infrastructure Prot.},
volume = {4},
number = {2},
pages = {88--103},
year = {2011},
url = {https://doi.org/10.1016/j.ijcip.2011.06.005},
doi = {10.1016/J.IJCIP.2011.06.005},
timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijcip/MorrisSRGPR11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MorrisPLMYKFM11,
author = {Thomas H. Morris and
Shengyi Pan and
Jeremy Lewis and
Jonathan Moorhead and
Nicolas H. Younan and
Roger L. King and
Mark Freund and
Vahid Madani},
editor = {Frederick T. Sheldon and
Robert K. Abercrombie and
Axel W. Krings},
title = {Cybersecurity risk testing of substation phasor measurement units
and phasor data concentrators},
booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence
Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
2011},
pages = {24},
publisher = {{ACM}},
year = {2011},
url = {https://doi.org/10.1145/2179298.2179324},
doi = {10.1145/2179298.2179324},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/csiirw/MorrisPLMYKFM11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MorrisVD11,
author = {Thomas H. Morris and
Rayford B. Vaughn and
Yoginder S. Dandass},
editor = {Frederick T. Sheldon and
Robert K. Abercrombie and
Axel W. Krings},
title = {A testbed for {SCADA} control system cybersecurity research and pedagogy},
booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence
Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
2011},
pages = {27},
publisher = {{ACM}},
year = {2011},
url = {https://doi.org/10.1145/2179298.2179327},
doi = {10.1145/2179298.2179327},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/csiirw/MorrisVD11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/MorrisN10,
author = {Thomas H. Morris and
V. S. S. Nair},
title = {Private computing on public platforms: portable application security},
journal = {Wirel. Commun. Mob. Comput.},
volume = {10},
number = {7},
pages = {942--958},
year = {2010},
url = {https://doi.org/10.1002/wcm.804},
doi = {10.1002/WCM.804},
timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/wicomm/MorrisN10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GaoMRR10,
author = {Wei Gao and
Thomas H. Morris and
Bradley Reaves and
Drew Richey},
title = {On {SCADA} control system command and response injection and intrusion
detection},
booktitle = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October
18-20, 2010},
pages = {1--9},
publisher = {{IEEE}},
year = {2010},
url = {https://doi.org/10.1109/ecrime.2010.5706699},
doi = {10.1109/ECRIME.2010.5706699},
timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
biburl = {https://dblp.org/rec/conf/ecrime/GaoMRR10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ReavesM09,
author = {Bradley Reaves and
Thomas H. Morris},
title = {Discovery, infiltration, and denial of service in a process control
system wireless network},
booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
20-21, 2009},
pages = {1--9},
publisher = {{IEEE}},
year = {2009},
url = {https://doi.org/10.1109/ECRIME.2009.5342612},
doi = {10.1109/ECRIME.2009.5342612},
timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
biburl = {https://dblp.org/rec/conf/ecrime/ReavesM09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/MorrisN09,
author = {Thomas H. Morris and
V. S. S. Nair},
title = {Encryption Key Protection for Private Computing on Public Platforms},
booktitle = {Seventh Annual {IEEE} International Conference on Pervasive Computing
and Communications - Workshops (PerCom Workshops 2009), 9-13 March
2009, Galveston, TX, {USA}},
pages = {1--6},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/PERCOM.2009.4912897},
doi = {10.1109/PERCOM.2009.4912897},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/percom/MorrisN09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MorrisN08,
author = {Thomas H. Morris and
V. S. S. Nair},
title = {Privacy Protected {ELF} for Private Computing on Public Platforms},
booktitle = {Proceedings of the The Third International Conference on Availability,
Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
University of Catalonia, Barcelona , Spain},
pages = {452--457},
publisher = {{IEEE} Computer Society},
year = {2008},
url = {https://doi.org/10.1109/ARES.2008.160},
doi = {10.1109/ARES.2008.160},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/IEEEares/MorrisN08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/MorrisN08,
author = {Thomas H. Morris and
V. S. S. Nair},
title = {Secure Context Switch for Private Computing on Public Platforms},
booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM}
2008, New Orleans, LA, USA, 30 November - 4 December 2008},
pages = {2159--2163},
publisher = {{IEEE}},
year = {2008},
url = {https://doi.org/10.1109/GLOCOM.2008.ECP.416},
doi = {10.1109/GLOCOM.2008.ECP.416},
timestamp = {Tue, 23 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/globecom/MorrisN08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/MorrisN07,
author = {Thomas H. Morris and
V. S. S. Nair},
title = {{PCPP:} On Remote Host Assessment via Naive Bayesian Classification},
booktitle = {21th International Parallel and Distributed Processing Symposium {(IPDPS}
2007), Proceedings, 26-30 March 2007, Long Beach, California, {USA}},
pages = {1--8},
publisher = {{IEEE}},
year = {2007},
url = {https://doi.org/10.1109/IPDPS.2007.370619},
doi = {10.1109/IPDPS.2007.370619},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ipps/MorrisN07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amia/RoccaKPM99,
author = {Mitra Rocca and
V. Lawrence Kudryk and
John C. Pajak and
Tommy H. Morris},
title = {The evolution of a teledentistry system within the Department of Defense},
booktitle = {{AMIA} 1999, American Medical Informatics Association Annual Symposium,
Washington, DC, USA, November 6-10, 1999},
publisher = {{AMIA}},
year = {1999},
url = {https://knowledge.amia.org/amia-55142-a1999a-1.591078/t-001-1.593353/f-001-1.593354/a-186-1.593409/a-187-1.593406},
timestamp = {Wed, 17 Apr 2024 11:48:49 +0200},
biburl = {https://dblp.org/rec/conf/amia/RoccaKPM99.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.