Rakesh B Bobba
Citado por
Citado por
Detecting false data injection attacks on dc state estimation
RB Bobba, KM Rogers, Q Wang, H Khurana, K Nahrstedt, TJ Overbye
Preprints of the first workshop on secure control systems, CPSWEEK 2010, 2010
Attribute-sets: A practically motivated enhancement to attribute-based encryption
R Bobba, H Khurana, M Prabhakaran
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures
S Zonouz, KM Rogers, R Berthier, RB Bobba, WH Sanders, TJ Overbye
IEEE Transactions on Smart Grid 3 (4), 1790-1799, 2012
A cyber-physical modeling and assessment framework for power grid infrastructures
KR Davis, CM Davis, SA Zonouz, RB Bobba, R Berthier, L Garcia, ...
IEEE Transactions on smart grid 6 (5), 2464-2475, 2015
Bootstrapping security associations for routing in mobile ad-hoc networks
RB Bobba, L Eschenauer, V Gligor, W Arbaugh
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
AMI threats, intrusion detection requirements and deployment recommendations
D Grochocki, JH Huh, R Berthier, R Bobba, WH Sanders, AA Cárdenas, ...
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures
S Zonouz, CM Davis, KR Davis, R Berthier, RB Bobba, WH Sanders
IEEE Transaction on Smart Grid 5 (1), 3 -13, 2014
Topology perturbation for detecting malicious data injection
KL Morrow, E Heine, KM Rogers, RB Bobba, TJ Overbye
2012 45th Hawaii international conference on system sciences, 2104-2113, 2012
Moving target defense for hardening the security of the power system state estimation
MA Rahman, E Al-Shaer, RB Bobba
Proceedings of the First ACM Workshop on Moving Target Defense, 59-68, 2014
A framework integrating attribute-based policies into role-based access control
J Huang, DM Nicol, R Bobba, JH Huh
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
Design principles for power grid cyber-infrastructure authentication protocols
H Khurana, R Bobba, T Yardley, P Agarwal, E Heine
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
Power flow cyber attacks and perturbation-based defense
KR Davis, KL Morrow, R Bobba, E Heine
2012 IEEE third international conference on smart grid communications …, 2012
End-to-end network delay guarantees for real-time systems using SDN
R Kumar, M Hasan, S Padhy, K Evchenko, L Piramanayagam, S Mohan, ...
2017 IEEE Real-Time Systems Symposium (RTSS), 231-242, 2017
Security of Smart Distribution Grids: Data Integrity Attacks on Integrated Volt/VAR Control and Countermeasures
A Teixeira, G Dán, H Sandberg, R Berthier, RB Bobba, A Valdes
American Control Conference, 2014
Enhancing grid measurements: Wide area measurement systems, NASPInet, and security
RB Bobba, J Dagle, E Heine, H Khurana, WH Sanders, P Sauer, ...
IEEE Power and Energy Magazine 10 (1), 67-73, 2011
Real-time systems security through scheduler constraints
S Mohan, MK Yoon, R Pellizzoni, R Bobba
2014 26th Euromicro Conference on Real-Time Systems, 129-140, 2014
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures
AA Cárdenas, R Berthier, RB Bobba, JH Huh, JG Jetcheva, D Grochocki, ...
IEEE Transactions on Smart Grid 5 (2), 906-915, 2014
Reliable GPS-based timing for power systems: A multi-layered multi-receiver architecture
L Heng, JJ Makela, AD Dominguez-Garcia, RB Bobba, WH Sanders, ...
Power and Energy Conference at Illinois (PECI), 2014, 1-7, 2014
Using attribute-based access control to enable attribute-based messaging
R Bobba, O Fatemieh, F Khan, CA Gunter, H Khurana
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 403-413, 2006
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
K Tajik, A Gunasekaran, R Dutta, B Ellis, RB Bobba, M Rosulek, ...
26th Annual Network and Distributed System Security Symposium, NDSS 2019, 2019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20