Detecting false data injection attacks on dc state estimation RB Bobba, KM Rogers, Q Wang, H Khurana, K Nahrstedt, TJ Overbye Preprints of the first workshop on secure control systems, CPSWEEK 2010, 2010 | 565 | 2010 |
Attribute-sets: A practically motivated enhancement to attribute-based encryption R Bobba, H Khurana, M Prabhakaran Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 231 | 2009 |
SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures S Zonouz, KM Rogers, R Berthier, RB Bobba, WH Sanders, TJ Overbye IEEE Transactions on Smart Grid 3 (4), 1790-1799, 2012 | 212 | 2012 |
A cyber-physical modeling and assessment framework for power grid infrastructures KR Davis, CM Davis, SA Zonouz, RB Bobba, R Berthier, L Garcia, ... IEEE Transactions on smart grid 6 (5), 2464-2475, 2015 | 161 | 2015 |
Bootstrapping security associations for routing in mobile ad-hoc networks RB Bobba, L Eschenauer, V Gligor, W Arbaugh GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003 | 136 | 2003 |
AMI threats, intrusion detection requirements and deployment recommendations D Grochocki, JH Huh, R Berthier, R Bobba, WH Sanders, AA Cárdenas, ... 2012 IEEE Third International Conference on Smart Grid Communications …, 2012 | 133 | 2012 |
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures S Zonouz, CM Davis, KR Davis, R Berthier, RB Bobba, WH Sanders IEEE Transaction on Smart Grid 5 (1), 3 -13, 2014 | 126 | 2014 |
Topology perturbation for detecting malicious data injection KL Morrow, E Heine, KM Rogers, RB Bobba, TJ Overbye 2012 45th Hawaii international conference on system sciences, 2104-2113, 2012 | 116 | 2012 |
Moving target defense for hardening the security of the power system state estimation MA Rahman, E Al-Shaer, RB Bobba Proceedings of the First ACM Workshop on Moving Target Defense, 59-68, 2014 | 114 | 2014 |
A framework integrating attribute-based policies into role-based access control J Huang, DM Nicol, R Bobba, JH Huh Proceedings of the 17th ACM symposium on Access Control Models and …, 2012 | 108 | 2012 |
Design principles for power grid cyber-infrastructure authentication protocols H Khurana, R Bobba, T Yardley, P Agarwal, E Heine 2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010 | 100 | 2010 |
End-to-end network delay guarantees for real-time systems using SDN R Kumar, M Hasan, S Padhy, K Evchenko, L Piramanayagam, S Mohan, ... 2017 IEEE Real-Time Systems Symposium (RTSS), 231-242, 2017 | 98 | 2017 |
Power flow cyber attacks and perturbation-based defense KR Davis, KL Morrow, R Bobba, E Heine 2012 IEEE third international conference on smart grid communications …, 2012 | 97 | 2012 |
Security of Smart Distribution Grids: Data Integrity Attacks on Integrated Volt/VAR Control and Countermeasures A Teixeira, G Dán, H Sandberg, R Berthier, RB Bobba, A Valdes American Control Conference, 2014 | 84 | 2014 |
Enhancing grid measurements: Wide area measurement systems, NASPInet, and security RB Bobba, J Dagle, E Heine, H Khurana, WH Sanders, P Sauer, ... IEEE Power and Energy Magazine 10 (1), 67-73, 2011 | 76 | 2011 |
Real-time systems security through scheduler constraints S Mohan, MK Yoon, R Pellizzoni, R Bobba 2014 26th Euromicro Conference on Real-Time Systems, 129-140, 2014 | 73 | 2014 |
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures AA Cárdenas, R Berthier, RB Bobba, JH Huh, JG Jetcheva, D Grochocki, ... IEEE Transactions on Smart Grid 5 (2), 906-915, 2014 | 72 | 2014 |
Reliable GPS-based timing for power systems: A multi-layered multi-receiver architecture L Heng, JJ Makela, AD Dominguez-Garcia, RB Bobba, WH Sanders, ... Power and Energy Conference at Illinois (PECI), 2014, 1-7, 2014 | 71 | 2014 |
Using attribute-based access control to enable attribute-based messaging R Bobba, O Fatemieh, F Khan, CA Gunter, H Khurana 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 403-413, 2006 | 70 | 2006 |
PBES: a policy based encryption system with application to data sharing in the power grid R Bobba, H Khurana, M AlTurki, F Ashraf Proceedings of the 4th international symposium on information, computer, and …, 2009 | 67 | 2009 |