关注
Bogdan Copos
Bogdan Copos
Google
在 ucdavis.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Is anybody home? inferring activity from smart home network traffic
B Copos, K Levitt, M Bishop, J Rowe
2016 IEEE Security and Privacy Workshops (SPW), 245-251, 2016
1722016
Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things
I Agadakos, CY Chen, M Campanelli, P Anantharaman, M Hasan, ...
442017
IoTHound: environment-agnostic device identification and monitoring
P Anantharaman, L Song, I Agadakos, G Ciocarlie, B Copos, U Lindqvist, ...
Proceedings of the 10th International Conference on the Internet of Things, 1-9, 2020
132020
Autonomous reasoning system for vulnerability analysis
P Murthy, B Copos, T Pham
US Patent 9,767,290, 2017
132017
InputFinder: Reverse Engineering Closed Binaries using Hardware Performance Counters
B Copos, P Murthy
Program Protection and Reverse Engineering Workshop 5, 2015
132015
Security for resilient iobt systems: Emerging research directions
I Agadakos, GF Ciocarlie, B Copos, J George, N Leslie, J Michaelis
IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019
72019
Butterfly Effect: Causality from Chaos in the IoT
I Agadakos, G Ciocarlie, B Copos, T Lepoint, M Locasto, U Lindqvist
IoTSec, 2018
72018
Security and Privacy for Emerging Smart Community Infrastructures
B Copos, K Levitt, J Rowe, P Kianmajd, CN Chuah, G Kesidis
International Conference on Internet of Things and Big Data (IoTBD), 2016
62016
Determining valid inputs for an unknown binary program
B Copos, P Murthy
US Patent 9,552,284, 2017
42017
Apparatus and method for a jitter cancellation circuit
PJ Kramer, JM Sandner
US Patent 7,133,483, 2006
42006
A communications validity detector for SCADA networks
P Anantharaman, A Chachra, S Sinha, M Millian, B Copos, S Smith, ...
Critical Infrastructure Protection XV: 15th IFIP WG 11.10 International …, 2022
32022
Determining a valid input for an unknown binary module
B Copos, P Murthy
US Patent 9,772,931, 2017
32017
Catch me if you can: Using power analysis to identify HPC activity
B Copos, S Peisert
arXiv preprint arXiv:2005.03135, 2020
22020
Application of trust assessment techniques to iobt systems
I Agadakos, GF Ciocarlie, B Copos, M Emmi, J George, N Leslie, ...
MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), 833-840, 2019
22019
Risks and Benefits of Side-Channels in Battlefields
I Agadakos, GF Ciocarlie, B Copos, T Lepoint, U Lindqvist, ME Locasto, ...
2018 21st International Conference on Information Fusion (FUSION), 2290-2297, 2018
22018
Modeling Systems Using Side Channel Information
B Copos
University of California, Davis, 2017
22017
Securing Smart Cities: Implications and Challenges
I Agadakos, P Anantharaman, GF Ciocarlie, B Copos, M Emmi, T Lepoint, ...
Modeling and Design of Secure Internet of Things, 185-215, 2020
12020
Modeling cyber-physical attack paths in the internet-of-things
GF Ciocarlie, I Agadakos, CY Chen, M Campanelli, P Anantharaman, ...
US Patent 11,729,196, 2023
2023
Modeling Cyber-Physical Attack Paths In IoT
MC Bogdan Copos, Ulf Lindqvist, Michael Locasto, Gabriela Ciocarlie ...
US Patent App. P170,088, 2018
2018
CVD: A Communications Validity Detector for SCADA Networks
P Anantharaman, A Chachra, S Sinha, MC Millian, B Copos, SW Smith, ...
系统目前无法执行此操作,请稍后再试。
文章 1–20