


default search action
Stephen D. Wolthusen
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c127]Natasa Gajic
, Stephen D. Wolthusen:
Adaptable Smart Distribution Grid Topology Generation for Enhanced Resilience. critis 2023: 100-119 - [c126]James Wright, Stephen D. Wolthusen:
A Contextual Integrity Property to Impede Privacy Violations in 5G Networks. Critical Infrastructure Protection 2023: 115-139 - 2022
- [j21]Livinus Obiora Nweke, Goitom K. Weldehawaryat, Stephen D. Wolthusen:
Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus. Int. J. Crit. Infrastructure Prot. 36: 100506 (2022) - 2021
- [j20]Livinus Obiora Nweke
, Goitom K. Weldehawaryat, Stephen D. Wolthusen:
Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus. Int. J. Crit. Infrastructure Prot. 35: 100466 (2021) - 2020
- [c125]Livinus Obiora Nweke, Stephen D. Wolthusen:
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model. CNS 2020: 1-6 - [c124]Livinus Obiora Nweke, Stephen D. Wolthusen:
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection. CyCon 2020: 63-78 - [c123]Livinus Obiora Nweke, Goitom Kahsay Weldehawaryat
, Stephen D. Wolthusen:
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols. DRCN 2020: 1-8 - [c122]Livinus Obiora Nweke, Stephen D. Wolthusen:
Resilience Analysis of Software-Defined Networks Using Queueing Networks. ICNC 2020: 536-542 - [c121]Livinus Obiora Nweke, Stephen D. Wolthusen:
Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection. Wirtschaftsinformatik (Community Tracks) 2020: 331-340
2010 – 2019
- 2019
- [j19]Georgios Kavallieratos
, Nabin Chowdhury, Sokratis K. Katsikas, Vasileios Gkioulos, Stephen D. Wolthusen:
Threat Analysis for Smart Homes. Future Internet 11(10): 207 (2019) - [c120]Shuo Zhang, Stephen D. Wolthusen:
Structural Controllability Recovery via the Minimum-edge Addition. ACC 2019: 5822-5827 - [c119]Shuo Zhang, Stephen D. Wolthusen:
Driver-Node based Security Analysis for Network Controllability. ECC 2019: 2246-2251 - [p8]Salaheddin Darwish
, Ilia Nouretdinov, Stephen D. Wolthusen:
Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things. Security and Privacy Trends in the Industrial Internet of Thing 2019: 223-243 - 2018
- [c118]Shuo Zhang, Stephen D. Wolthusen:
Security-Aware Network Analysis for Network Controllability. AINA Workshops 2018: 508-514 - [c117]Pacome Landry Ambassa, Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel:
Privacy Risks in Resource Constrained Smart Micro-Grids. AINA Workshops 2018: 527-532 - [c116]Ammara Gul, Stephen D. Wolthusen:
In-Cycle Sequential Topology Faults and Attacks: Effects on State Estimation. CRITIS 2018: 17-28 - [c115]Shuo Zhang, Stephen D. Wolthusen:
Efficient Analysis to Protect Control into Critical Infrastructures. CRITIS 2018: 226-229 - [c114]Shuo Zhang, Stephen D. Wolthusen:
Efficient control recovery for resilient control systems. ICNSC 2018: 1-6 - [c113]Salaheddin Darwish, Ilia Nouretdinov, Stephen D. Wolthusen:
A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements. ICOST 2018: 146-157 - [c112]Ilia Nouretdinov, Salaheddin Darwish, Stephen D. Wolthusen:
Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution. ICOST 2018: 310-316 - [c111]Ammara Gul, Stephen D. Wolthusen:
Error Propagation after Reordering Attacks on Hierarchical State Estimation. Critical Infrastructure Protection 2018: 67-79 - [c110]Alessio Baiocco, Stephen D. Wolthusen:
Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard. ISGT Europe 2018: 1-6 - [c109]James G. Wright, Stephen D. Wolthusen:
Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service. ISGT Europe 2018: 1-6 - [p7]Anne V. D. M. Kayem
, Stephen D. Wolthusen, Christoph Meinel:
Power Systems: A Matter of Security and Privacy. Smart Micro-Grid Systems Security and Privacy 2018: 1-8 - [p6]Ammara Gul, Stephen D. Wolthusen:
A Review on Attacks and Their Countermeasures in Power System State Estimation. Smart Micro-Grid Systems Security and Privacy 2018: 9-28 - [p5]Anne V. D. M. Kayem
, Christoph Meinel, Stephen D. Wolthusen:
A Resilient Smart Micro-Grid Architecture for Resource Constrained Environments. Smart Micro-Grid Systems Security and Privacy 2018: 71-101 - [p4]Anesu M. C. Marufu, Anne V. D. M. Kayem
, Stephen D. Wolthusen:
The Design and Classification of Cheating Attacks on Power Marketing Schemes in Resource Constrained Smart Micro-Grids. Smart Micro-Grid Systems Security and Privacy 2018: 103-144 - [p3]Pacome L. Ambassa, Anne V. D. M. Kayem
, Stephen D. Wolthusen, Christoph Meinel:
Inferring Private User Behaviour Based on Information Leakage. Smart Micro-Grid Systems Security and Privacy 2018: 145-159 - [e8]Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel:
Smart Micro-Grid Systems Security and Privacy. Advances in Information Security 71, Springer 2018, ISBN 978-3-319-91426-8 [contents] - 2017
- [j18]Vasileios Gkioulos, Erko Risthein, Stephen D. Wolthusen:
TACTICS: Validation of the security framework developed for tactical SOA. J. Inf. Secur. Appl. 35: 96-105 (2017) - [j17]Cristina Alcaraz
, Javier López, Stephen D. Wolthusen:
OCPP Protocol: Security Threats and Challenges. IEEE Trans. Smart Grid 8(5): 2452-2459 (2017) - [c108]Anne V. D. M. Kayem
, Christoph Meinel, Stephen D. Wolthusen:
A Smart Micro-Grid Architecture for Resource Constrained Environments. AINA 2017: 857-864 - [c107]Shuo Zhang, Stephen D. Wolthusen:
Iterative recovery of controllability via maximum matching. CASE 2017: 328-333 - [c106]Vasileios Gkioulos, Stephen D. Wolthusen:
Security Infrastructure for Service Oriented Architectures at the Tactical Edge. CISIS 2017: 310-322 - [c105]James G. Wright, Stephen D. Wolthusen:
De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol. CRITIS 2017: 131-143 - [c104]Salaheddin Darwish
, Ilia Nouretdinov, Stephen D. Wolthusen:
Towards Composable Threat Assessment for Medical IoT (MIoT). EUSPN/ICTH 2017: 627-632 - [c103]Roberto Rigolin F. Lopes
, Mikko Nieminen, Antti Viidanoja, Stephen D. Wolthusen:
Reactive/proactive connectivity management in a tactical service-oriented infrastructure. ICMCIS 2017: 1-8 - [c102]Ammara Gul, Stephen D. Wolthusen:
Measurement re-ordering attacks on power system state estimation. ISGT Europe 2017: 1-6 - [c101]Vasileios Gkioulos, Stephen D. Wolthusen:
Security Requirements for the Deployment of Services Across Tactical SOA. MMM-ACNS 2017: 115-127 - [e7]Grigore M. Havârneanu, Roberto Setola, Hypatia Nassopoulos, Stephen D. Wolthusen:
Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10242, Springer 2017, ISBN 978-3-319-71367-0 [contents] - 2016
- [j16]Cristina Alcaraz
, Javier López
, Stephen D. Wolthusen:
Policy enforcement system for secure interoperable control in distributed Smart Grid systems. J. Netw. Comput. Appl. 59: 301-314 (2016) - [c100]Anne V. D. M. Kayem, Heinrich Strauss, Stephen D. Wolthusen, Christoph Meinel:
Key Management for Secure Demand Data Communication in Constrained Micro-Grids. AINA Workshops 2016: 585-590 - [c99]Pacome L. Ambassa, Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel:
Privacy Violations in Constrained Micro-Grids: Adversarial Cases. AINA Workshops 2016: 601-606 - [c98]Anesu M. C. Marufu, Anne V. D. M. Kayem
, Stephen D. Wolthusen:
Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating. CRITIS 2016: 137-149 - [c97]James G. Wright, Stephen D. Wolthusen:
Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol. CRITIS 2016: 239-251 - [c96]Heinrich Strauss, Anne V. D. M. Kayem
, Stephen D. Wolthusen:
Reliable Key Distribution in Smart Micro-Grids. CRITIS 2016: 265-270 - [c95]Vasileios Gkioulos, Stephen D. Wolthusen:
A Security Policy Infrastructure for Tactical Service Oriented Architectures. CyberICPS@ESORICS 2016: 37-51 - [c94]Pacome L. Ambassa, Stephen D. Wolthusen, Anne V. D. M. Kayem
, Christoph Meinel:
Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids. CyberICPS@ESORICS 2016: 52-68 - [c93]Goitom K. Weldehawaryat
, Pacome L. Ambassa, Anesu M. C. Marufu, Stephen D. Wolthusen, Anne V. D. M. Kayem
:
Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security. CyberICPS@ESORICS 2016: 69-86 - [c92]Vasileios Gkioulos, Stephen D. Wolthusen:
Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures. FNSS 2016: 47-61 - [c91]Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen:
Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids. HPCC/SmartCity/DSS 2016: 1380-1387 - [c90]Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen:
Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. ICISSP 2016: 448-456 - [c89]James G. Wright, Stephen D. Wolthusen:
Limitations of IEC62351-3's public key management. ICNP 2016: 1-6 - [c88]Bernhard Schneidhofer, Stephen D. Wolthusen:
Multigraph Critical Infrastructure Model. Critical Infrastructure Protection 2016: 149-167 - [c87]Vasileios Gkioulos, Stephen D. Wolthusen, Adam Flizikowski
, Anna Stachowicz, Dariusz Nogalski
, Kamil Gleba, Joanna Sliwa:
Interoperability of security and quality of Service Policies Over Tactical SOA. SSCI 2016: 1-7 - [c86]Vasileios Gkioulos, Stephen D. Wolthusen:
Securing tactical service oriented architectures. SSIC 2016: 1-6 - [e6]Erich Rome, Marianthi Theocharidou
, Stephen D. Wolthusen:
Critical Information Infrastructures Security - 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9578, Springer 2016, ISBN 978-3-319-33330-4 [contents] - 2015
- [c85]Bader Alwasel, Stephen D. Wolthusen:
Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs. AINA Workshops 2015: 418-423 - [c84]Abdulrahman Al-Mutairi, Stephen D. Wolthusen:
MPLS Policy Target Recognition Network. CRiSIS 2015: 71-87 - [c83]Bader Alwasel, Stephen D. Wolthusen:
Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes. CRITIS 2015: 105-119 - [c82]Anesu M. C. Marufu, Anne V. D. M. Kayem
, Stephen D. Wolthusen:
A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids. CRITIS 2015: 183-196 - [c81]Goitom K. Weldehawaryat
, Stephen D. Wolthusen:
Modelling interdependencies over incomplete join structures of power law networks. DRCN 2015: 173-178 - [c80]Pacome L. Ambassa, Anne V. D. M. Kayem
, Stephen D. Wolthusen, Christoph Meinel:
Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids. FNSS 2015: 166-180 - [c79]Goitom K. Weldehawaryat
, Stephen D. Wolthusen:
Secure distributed demand projection in micro-grids. GIIS 2015: 1-6 - [c78]Sameera Al-Mulla, Youssef Iraqi
, Stephen D. Wolthusen:
Inferring relevance and presence of evidence in service-oriented and SaaS architectures. ISCC 2015: 152-159 - [c77]Pacome L. Ambassa, Stephen D. Wolthusen, Anne V. D. M. Kayem, Christoph Meinel:
Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids. ISGT Asia 2015: 1-6 - [c76]Roberto Rigolin Ferreira Lopes
, Stephen D. Wolthusen:
Distributed security policies for service-oriented architectures over tactical networks. MILCOM 2015: 1548-1553 - [c75]Alessio Baiocco, Chiara Foglietta
, Stephen D. Wolthusen:
Delay and jitter attacks on hierarchical state estimation. SmartGridComm 2015: 485-490 - [i3]Alessandro Aloisio, Marco Autili
, Alfredo D'Angelo, Antti Viidanoja, Jérémie Leguay, Tobias Ginzler, Thorsten A. Lampe, Luca Spagnolo, Stephen D. Wolthusen, Adam Flizikowski, Joanna Sliwa:
TACTICS: TACTICal Service Oriented Architecture. CoRR abs/1504.07578 (2015) - 2014
- [c74]Abdulrahman Al-Mutairi, Stephen D. Wolthusen:
Malicious MPLS Policy Engine Reconnaissance. Communications and Multimedia Security 2014: 3-18 - [c73]Suaad S. Alarifi
, Stephen D. Wolthusen:
Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems. Communications and Multimedia Security 2014: 73-85 - [c72]Thomas Richard McEvoy
, Stephen D. Wolthusen:
An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms. CRITIS 2014: 109-121 - [c71]Bader Alwasel, Stephen D. Wolthusen:
Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use. CRITIS 2014: 293-307 - [c70]Bader Alwasel, Stephen D. Wolthusen:
Reconstruction of structural controllability over Erdős-Rényi graphs via power dominating sets. CISR 2014: 57-60 - [c69]Cristina Alcaraz, Stephen D. Wolthusen:
Recovery of Structural Controllability for Control Systems. Critical Infrastructure Protection 2014: 47-63 - [c68]Goitom Weldehawaryat
, Stephen D. Wolthusen:
Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence. Critical Infrastructure Protection 2014: 263-276 - [c67]Alessio Baiocco, Stephen D. Wolthusen:
Dynamic forced partitioning of robust hierarchical state estimators for power networks. ISGT 2014: 1-5 - [c66]Alessio Baiocco, Stephen D. Wolthusen, Chiara Foglietta
, Stefano Panzieri
:
A model for robust distributed hierarchical electric power grid state estimation. ISGT 2014: 1-5 - [c65]Suaad S. Alarifi
, Stephen D. Wolthusen:
Mitigation of Cloud-Internal Denial of Service Attacks. SOSE 2014: 478-483 - 2013
- [j15]Thomas Richard McEvoy
, Stephen D. Wolthusen:
Locating subverted processes using random packet comparison in SCADA systems. Int. J. Crit. Infrastructures 9(1/2): 32-51 (2013) - [c64]Suaad S. Alarifi
, Stephen D. Wolthusen:
Robust Coordination of Cloud-Internal Denial of Service Attacks. CGC 2013: 135-142 - [c63]Cristina Alcaraz
, Estefanía Etchevés Miciolino
, Stephen D. Wolthusen:
Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal. CRITIS 2013: 120-132 - [c62]Yangyue Feng, Chiara Foglietta
, Alessio Baiocco, Stefano Panzieri
, Stephen D. Wolthusen:
Malicious false data injection in hierarchical electric power grid state estimation systems. e-Energy 2013: 183-192 - [c61]Abdulrahman Al-Mutairi, Stephen D. Wolthusen:
An analysis of service degradation attacks against real-time MPLS networks. ISSA 2013: 1-8 - [c60]Peter Weston, Stephen D. Wolthusen:
Forensic entropy analysis of microsoft windows storage volumes. ISSA 2013: 1-7 - [c59]Cristina Alcaraz, Estefanía Etchevés Miciolino, Stephen D. Wolthusen:
Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs. ISC 2013: 140-151 - [c58]Suaad S. Alarifi
, Stephen D. Wolthusen:
Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines. NSS 2013: 321-335 - [c57]Goitom Weldehawaryat
, Stephen D. Wolthusen:
Asynchronous message-passing binary consensus over non-complete graphs. NSW 2013: 9-15 - [e5]Sandro Bologna, Bernhard M. Hämmerli, Dimitris Gritzalis, Stephen D. Wolthusen:
Critical Information Infrastructure Security - 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6983, Springer 2013, ISBN 978-3-642-41475-6 [contents] - 2012
- [j14]Saif M. Al-Kuwari
, Stephen D. Wolthusen:
Algorithmic approach for clandestine localisation and tracking in short-range environments. Int. J. Commun. Networks Distributed Syst. 9(3/4): 311-327 (2012) - [c56]Mark M. Seeger, Stephen D. Wolthusen:
Towards Concurrent Data Sampling Using GPU Coprocessing. ARES 2012: 557-563 - [c55]Thomas Richard McEvoy
, Stephen D. Wolthusen:
Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures. CRITIS 2012: 168-179 - [c54]Suaad S. Alarifi, Stephen D. Wolthusen:
Detecting anomalies in IaaS environments through virtual machine host system call analysis. ICITST 2012: 211-218 - [c53]Thomas Richard McEvoy
, Stephen D. Wolthusen:
Agent Interaction and State Determination in SCADA Systems. Critical Infrastructure Protection 2012: 99-109 - [c52]Saif M. Al-Kuwari
, Stephen D. Wolthusen:
Forensic Tracking and Mobility Prediction in Vehicular Networks. IFIP Int. Conf. Digital Forensics 2012: 303-317 - [c51]Mark M. Seeger, Stephen D. Wolthusen:
A model for partially asynchronous observation of malicious behavior. ISSA 2012: 1-7 - [p2]Javier López
, Roberto Setola
, Stephen D. Wolthusen:
Overview of Critical Information Infrastructure Protection. Critical Infrastructure Protection 2012: 1-14 - [p1]Nils Kalstad Svendsen, Stephen D. Wolthusen:
Modelling Approaches. Critical Infrastructure Protection 2012: 68-97 - [e4]Javier López, Roberto Setola, Stephen D. Wolthusen:
Critical Infrastructure Protection - Information Infrastructure Models, Analysis, and Defense. Lecture Notes in Computer Science 7130, Springer 2012, ISBN 978-3-642-28919-4 [contents] - 2011
- [j13]Stephen D. Wolthusen:
Next generation networks. Inf. Secur. Tech. Rep. 16(1): 1-2 (2011) - [c50]Thomas Richard McEvoy
, Stephen D. Wolthusen:
Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation. CRITIS 2011: 70-80 - [c49]Thomas Richard McEvoy, Stephen D. Wolthusen:
A Plant-Wide Industrial Process Control Security Problem. Critical Infrastructure Protection 2011: 47-56 - [c48]Ziyad S. Al-Salloum, Stephen D. Wolthusen:
A propagation model of a vulnerability mitigation computer worm - seawave. NSS 2011: 347-352 - [c47]Saif M. Al-Kuwari
, Stephen D. Wolthusen:
Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework. SADFE 2011: 1-4 - [e3]Christos Xenakis
, Stephen D. Wolthusen:
Critical Information Infrastructures Security - 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papers. Lecture Notes in Computer Science 6712, Springer 2011, ISBN 978-3-642-21693-0 [contents] - 2010
- [c46]Ziyad S. Al-Salloum, Stephen D. Wolthusen:
Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. ARES 2010: 549-554 - [c45]Saif M. Al-Kuwari
, Stephen D. Wolthusen:
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. Communications and Multimedia Security 2010: 16-27 - [c44]Thomas Richard McEvoy
, Stephen D. Wolthusen:
A Formal Adversary Capability Model for SCADA Environments. CRITIS 2010: 93-103 - [c43]Saif M. Al-Kuwari
, Stephen D. Wolthusen:
On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles. e-Forensics 2010: 207-223 - [c42]Thomas Richard McEvoy
, Stephen D. Wolthusen:
Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. Critical Infrastructure Protection 2010: 81-94 - [c41]Nils Lunden, Robin Sveen, Hans Lund, Nils Kalstad Svendsen, Stephen D. Wolthusen:
Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments. Critical Infrastructure Protection 2010: 171-183 - [c40]Saif M. Al-Kuwari
, Stephen D. Wolthusen:
Forensic Tracking and Mobility Prediction in Vehicular Networks. IFIP Int. Conf. Digital Forensics 2010: 91-105 - [c39]Danish Mairaj, Stephen D. Wolthusen, Christoph Busch:
Teeth Segmentation and Feature Extraction for Odontological Biometrics. IIH-MSP 2010: 323-328 - [c38]Ziyad S. Al-Salloum, Stephen D. Wolthusen:
A link-layer-based self-replicating vulnerability discovery agent. ISCC 2010: 704-707 - [c37]Thomas Richard McEvoy
, Stephen D. Wolthusen:
Host-Based Security Sensor Integrity in Multiprocessing Environments. ISPEC 2010: 138-152 - [c36]Ziyad S. Al-Salloum, Stephen D. Wolthusen:
Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic Topology Information. ISSA 2010 - [c35]Mark M. Seeger, Stephen D. Wolthusen, Christoph Busch, Harald Baier:
The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation. ISSA 2010 - [c34]Saif M. Al-Kuwari
, Stephen D. Wolthusen:
Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks. MobiSec 2010: 67-79
2000 – 2009
- 2009
- [j12]Stephen D. Wolthusen:
Editorial. Comput. Secur. 28(1-2): 1 (2009) - [c33]Thomas Richard McEvoy
, Stephen D. Wolthusen:
Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems. CRITIS 2009: 62-72 - [c32]Halvor Borgen, Patrick Bours, Stephen D. Wolthusen:
Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance. ICB 2009: 857-867 - [c31]Saif M. Al-Kuwari
, Stephen D. Wolthusen:
A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks. ICDF2C 2009: 19-32 - [c30]Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch, Arjan Kuijper
:
A Security Analysis of Biometric Template Protection Schemes. ICIAR 2009: 429-438 - [c29]Nils Kalstad Svendsen, Stephen D. Wolthusen:
Using Physical Models for Anomaly Detection in Control Systems. Critical Infrastructure Protection 2009: 139-149 - [c28]Katrin Franke, Erik Hjelmås, Stephen D. Wolthusen:
Advancing Digital Forensics. World Conference on Information Security Education 2009: 288-295 - [c27]Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch, Arjan Kuijper
:
Feature Correlation Attack on Biometric Privacy Protection Schemes. IIH-MSP 2009: 1061-1065 - [c26]Stephen D. Wolthusen, Christoph Busch:
Non-Forensic Odontological Biometrics. IIH-MSP 2009: 1105-1109 - [c25]Stephen D. Wolthusen:
Overcast: Forensic Discovery in Cloud Environments. IMF 2009: 3-9 - [c24]Ziyad S. Al-Salloum, Stephen D. Wolthusen:
Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination. IMF 2009: 41-53 - [c23]Erik Hjelmås, Nils Kalstad Svendsen, Stephen D. Wolthusen:
Integrating Information Security with Information System Architecture and Administration Curricula. ISSA 2009: 363-376 - 2008
- [j11]Stephen D. Wolthusen:
Editorial. Comput. Secur. 27(1-2): 1 (2008) - [j10]Stephen D. Wolthusen:
Editorial. Comput. Secur. 27(3-4): 63 (2008) - [j9]Stephen D. Wolthusen:
From the Editor-in-Chief. Comput. Secur. 27(5-6): 123 (2008) - [j8]Stephen D. Wolthusen:
Editorial. Comput. Secur. 27(7-8): 233-234 (2008) - [c22]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65 - [c21]Nils Kalstad Svendsen, Stephen D. Wolthusen:
Modeling And Detecting Anomalies In Scada Systems. Critical Infrastructure Protection 2008: 101-113 - [c20]Halvor Borgen, Patrick Bours, Stephen D. Wolthusen:
Visible-Spectrum Biometric Retina Recognition. IIH-MSP 2008: 1056-1062 - [c19]Thomas Richard McEvoy, Stephen D. Wolthusen:
Using Observations of Invariant Behaviour to Detect Malicious Agency in Distributed Environments. IMF 2008: 55-72 - [c18]Meng-Da Wu, Stephen D. Wolthusen:
Network Forensics of Partial SSL/TLS Encrypted Traffic Classification Using Clustering Algorithms. IMF 2008: 157-172 - [i2]Richard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage:
08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008 - [i1]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs. IACR Cryptol. ePrint Arch. 2008: 308 (2008) - 2007
- [j7]Stephen D. Wolthusen:
Vertrauenswürdige Protokollierung - Protokollierung mittels nicht-deterministischer nebenläufiger wechselseitiger Überwachung. Datenschutz und Datensicherheit 31(10): 740-743 (2007) - [j6]Stephen D. Wolthusen:
ISTR special issue on critical infrastructure protection. Inf. Secur. Tech. Rep. 12(1): 1 (2007) - [j5]Nils Kalstad Svendsen, Stephen D. Wolthusen:
Connectivity models of interdependency in mixed-type critical infrastructure networks. Inf. Secur. Tech. Rep. 12(1): 44-55 (2007) - [c17]Nils Kalstad Svendsen, Stephen D. Wolthusen:
Graph Models of Critical Infrastructure Interdependencies. AIMS 2007: 208-211 - [c16]Stephen D. Wolthusen:
Modeling Network Security Services in Tactical Networks. CIS 2007 - [c15]Nils Kalstad Svendsen, Stephen D. Wolthusen:
An Analysis of Cyclical Interdependencies in Critical Infrastructures. CRITIS 2007: 25-36 - [c14]Nils Kalstad Svendsen, Stephen D. Wolthusen:
A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures. CRITIS 2007: 37-48 - [c13]Nils Kalstad Svendsen, Stephen D. Wolthusen:
Multigraph Dependency Models for Heterogeneous Infrastructures. Critical Infrastructure Protection 2007: 337-350 - [c12]Stephen D. Wolthusen:
The Role of Mathematics in Information Security Education. World Conference on Information Security Education 2007: 129-136 - 2006
- [j4]Stephen D. Wolthusen:
Revisionssichere Protokollierung in Standardbetriebssystemen. Datenschutz und Datensicherheit 30(5): 281-284 (2006) - [j3]Stephen D. Wolthusen:
Windows device interface security. Inf. Secur. Tech. Rep. 11(4): 160-165 (2006) - [c11]Erik Hjelmås, Stephen D. Wolthusen:
Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs. InfoSecCD 2006: 5-12 - [c10]Ole Martin Dahl, Stephen D. Wolthusen:
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets. IWIA 2006: 157-168 - 2005
- [c9]Frank Graf, Stephen D. Wolthusen:
A Capability-Based Transparent Cryptographic File System. CW 2005: 101-108 - [c8]Bernhard M. Hämmerli, Stephen D. Wolthusen:
Critical (Information) Infrastructure Protection. GI Jahrestagung (1) 2005: 466-467 - [c7]Jaromir Likavec, Stephen D. Wolthusen:
Enforcing Messaging Security Policies. IWIA 2005: 131-138 - 2004
- [e2]John L. Cole, Stephen D. Wolthusen:
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA. IEEE Computer Society 2004, ISBN 0-7695-2117-7 [contents] - 2003
- [b2]Michael Arnold, Martin Schmucker, Stephen D. Wolthusen:
Techniques and Applications of Digital Watermarking and Content Protection. Artech House computer security series, Artech House 2003, ISBN 978-1-58053-111-5, pp. I-XV, 1-274 - [b1]Stephen D. Wolthusen:
A model independent security architecture for distributed heterogeneous systems. Darmstadt University of Technology, 2003, ISBN 3-8325-0416-8, pp. 1-434 - [c6]Stephen D. Wolthusen:
Goalkeeper: Close-In Interface Protection. ACSAC 2003: 334-341 - [c5]Stephen D. Wolthusen:
A Distributed Multipurpose Mail Guard (Blinded). IAW 2003: 268-275 - [e1]John L. Cole, Stephen D. Wolthusen:
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany. IEEE Computer Society 2003, ISBN 0-7695-2019-7 [contents] - 2002
- [j2]Stephen D. Wolthusen:
Access and Use Control using Externally Controlled Reference Monitors. ACM SIGOPS Oper. Syst. Rev. 36(1): 58-69 (2002) - [c4]Christoph Busch, Stephen D. Wolthusen:
Sensitivity labels and invisible identification markings in human-readable output. Security and Watermarking of Multimedia Contents 2002: 149-157 - 2001
- [c3]Stephen D. Wolthusen:
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family. ACSAC 2001: 55-63 - [c2]E. Rademer, Stephen D. Wolthusen:
Transparent Access To Encrypted Data Using Operating System Network Stack Extensions. Communications and Multimedia Security 2001 - [c1]Christoph Busch, Stephen D. Wolthusen:
Tracing data diffusion in industrial research with robust watermarking. MMSP 2001: 207-212
1990 – 1999
- 1999
- [j1]Christoph Busch, Wolfgang Funk, Stephen D. Wolthusen:
Digital Watermarking: From Concepts to Real-Time Video Applications. IEEE Computer Graphics and Applications 19(1): 25-35 (1999)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint