Stephen Dirk Bjørn Wolthusen
Publications
2025
-
Gajic, Natasa;
Wolthusen, Stephen Dirk Bjørn.
(2025)
Locally Optimal Information Pathways in the
Presence of Static Adversaries for a Hierarchical
Smart Distribution Grid Model.
Lecture Notes in Computer Science (LNCS)
Academic article
2024
-
Gajic, Natasa;
Wolthusen, Stephen Dirk Bjørn.
(2024)
Adaptable Smart Distribution Grid Topology Generation for Enhanced Resilience.
Springer Berlin/Heidelberg
Academic chapter/article/Conference paper
-
Gajic, Natasa;
Wolthusen, Stephen Dirk Bjørn.
(2024)
Improved Topology Generator with Hierarchical Information Overlay.
IFIP Advances in Information and Communication Technology
Academic article
2022
-
Nweke, Livinus Obiora;
Weldehawaryat, Goitom Kahsay;
Wolthusen, Stephen Dirk Bjørn.
(2022)
Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466)).
International Journal of Critical Infrastructure Protection
Errata
2021
-
Yeng, Prosper;
Wolthusen, Stephen Dirk Bjørn;
Yang, Bian.
(2021)
Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring.
International Journal of Advanced Computer Science and Applications (IJACSA)
Academic article
-
Nweke, Livinus Obiora;
Weldehawaryat, Goitom Kahsay;
Wolthusen, Stephen Dirk Bjørn.
(2021)
Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus.
International Journal of Critical Infrastructure Protection
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2021)
A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda.
Lecture Notes in Networks and Systems
Academic article
2020
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection.
International Conference on Cyber Conflict, CYCON
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
A Review of Asset-Centric Threat Modelling Approaches.
International Journal of Advanced Computer Science and Applications (IJACSA)
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection.
Wirtschaftsinformatik
Academic article
-
Nweke, Livinus Obiora;
Yeng, Prosper;
Wolthusen, Stephen;
Yang, Bian.
(2020)
Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices.
International Journal of Advanced Computer Science and Applications (IJACSA)
Academic article
-
Nweke, Livinus Obiora;
Weldehawaryat, Goitom Kahsay;
Wolthusen, Stephen.
(2020)
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Resilience Analysis of Software-Defined Networks Using Queueing Networks.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Yeng, Prosper;
Wolthusen, Stephen Dirk Bjørn;
Yang, Bian.
(2020)
Legal requirements toward enhancing the security
of medical devices.
International Journal of Advanced Computer Science and Applications (IJACSA)
Academic literature review
-
Yeng, Prosper;
Wolthusen, Stephen Dirk Bjørn;
Yang, Bian.
(2020)
Comparative Analysis of Threat Modeling Methods
for Cloud Computing towards Healthcare Security
Practice.
International Journal of Advanced Computer Science and Applications (IJACSA)
Academic article
2019
-
Gul, Ammara;
Wolthusen, Stephen.
(2019)
In-cycle sequential topology faults and attacks: Effects on state estimation.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Kavallieratos, Georgios;
Chowdhury, Nabin;
Katsikas, Sokratis;
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2019)
Threat Analysis for Smart Homes.
Future Internet
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen;
Mancini, Luigi V..
(2019)
A Framework for the Validation of Network Artifacts.
Norsk Informasjonssikkerhetskonferanse (NISK)
Academic article
2018
-
Wright, James G;
Wolthusen, Stephen.
(2018)
De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gul, Ammara;
Wolthusen, Stephen.
(2018)
Error propagation after reordering attacks on hierarchical state estimation.
IFIP Advances in Information and Communication Technology
Academic article
-
Baiocco, Alessio;
Wolthusen, Stephen.
(2018)
Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol.
IEEE Power & Energy Society General Meeting
Academic article
-
Darwish, Salaheddin;
Nouretdinov, Ilia;
Wolthusen, Stephen.
(2018)
A Dynamic Distributed Architecture
for Preserving Privacy of Medical IoT
Monitoring Measurements.
Lecture Notes in Computer Science (LNCS)
Academic article
2017
-
Wright, James G;
Wolthusen, Stephen.
(2017)
Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Rigolin Ferreira Lopes, Roberto;
Nieminen, Mikko;
Viidanoja, Antti;
Wolthusen, Stephen.
(2017)
Reactive/Proactive Connectivity Management in a
Tactical Service-Oriented Infrastructure.
IEEE Sarnoff Symposium
Academic chapter/article/Conference paper
-
Kayem, Anne V.D.M.;
Meinel, Christoph;
Wolthusen, Stephen.
(2017)
A smart micro-grid architecture for resource constrained environments.
Advanced Information Networking and Applications
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
Security Requirements for the Deployment of Services Across Tactical SOA.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gkioulos, Vasileios;
Risthein, Erko;
Wolthusen, Stephen.
(2017)
TACTICS: Validation of the security framework developed for tactical SOA.
Journal of Information Security and Applications
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017.
Advances in Intelligent Systems and Computing
Academic article
-
Ambassa, Pacome L.;
Wolthusen, Stephen;
Kayem, Anne V.D.M.;
Meinel, Christoph.
(2017)
Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids.
Springer
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
A Security Policy Infrastructure for Tactical Service Oriented Architectures.
Springer
Academic chapter/article/Conference paper
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2017)
Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures.
Advances in Intelligent Systems and Computing
Academic article
-
Weldehawaryat, Goitom Kahsay;
Ambassa, Pacome L.;
Marufu, Anesu M.C.;
Wolthusen, Stephen;
Kayem, Anne V.D.M..
(2017)
Decentralised scheduling of power consumption in micro-grids: Optimisation and security.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2017)
Power auctioning in resource constrained micro-grids: Cases of cheating.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Alcaraz, Cristina;
Lopez, Javier;
Wolthusen, Stephen.
(2017)
OCPP Protocol: Security Threats and Challenges.
IEEE Transactions on Smart Grid
Academic article
2016
-
Gkioulos, Vasileios;
Wolthusen, Stephen D..
(2016)
Securing tactical service oriented architectures.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2016)
MPLS Policy Target Recognition Network.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Ambassa, Pacome L.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen;
Meinel, Cristoph.
(2016)
Privacy Violations in Constrained Micro-grids: Adversarial Cases.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Almulla, Sameera;
Iraqi, Youssef;
Wolthusen, Stephen.
(2016)
Inferring relevance and presence of evidence in service-oriented and SaaS architectures.
Proceedings of the IEEE Symposium on Computers and Communications
Academic article
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2016)
A distributed continuous double auction framework for resource constrained microgrids.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen;
Flizikowski, Adam;
Stachowicz, Anna;
Nogalski, Dariusz;
Gleba, Kamil.
(2016)
Interoperability of security and quality of Service Policies Over Tactical SOA.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Alwasel, Bader;
Wolthusen, Stephen.
(2016)
Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use.
Springer
Academic chapter/article/Conference paper
-
Baiocco, Alessio;
Foglietta, Chiara;
Wolthusen, Stephen.
(2016)
Delay and Jitter Attacks on Hierarchical State Estimation.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2016)
Efficient security policy reconciliation in tactical service oriented architectures.
Communications in Computer and Information Science (CCIS)
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen;
Iossifides, Athanasios.
(2016)
A Survey on the Security Vulnerabilities of Cellular
Communication Systems (GSM-UMTS-LTE).
Norsk Informasjonssikkerhetskonferanse (NISK)
Academic article
-
Kayem, Anne;
Strauss, Heinrich;
Wolthusen, Stephen D.;
Meinel, Christoph.
(2016)
Key Management for Secure Demand Data Communication in Constrained Micro-grids.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Alwasel, Bader;
Wolthusen, Stephen.
(2016)
Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2016)
Fault-tolerant Distributed Continuous Double Auctioning on
Computationally Constrained Microgrids.
SciTePress
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2016)
An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms.
Springer
Academic chapter/article/Conference paper
-
Alcaraz, Cristina;
Lopeza, Javier;
Wolthusen, Stephen.
(2016)
Policy enforcement system for secure interoperable control in distributed Smart Grid systems.
Journal of Network and Computer Applications
Academic article
2015
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2015)
Secure distributed demand projection in micro-grids.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2015)
Modelling Interdependencies over Incomplete Join
Structures of Power Law Networks.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Alwasel, Bader;
Wolthusen, Stephen.
(2015)
Structural Controllability Analysis via Embedding
Power Dominating Set Approximation in
Erd˝os-R´enyi Graphs.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Lopes, Roberto Rigolin Ferreira;
Wolthusen, Stephen.
(2015)
Distributed Security Policies for Service-Oriented
Architectures over Tactical Networks.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Ambassa, Pacome L.;
Wolthusen, Stephen;
Kayem, Anne V.D.M.;
Meinel, Christoph.
(2015)
Robust Snapshot Algorithm for Power Consumption Monitoring
in Computationally Constrained Micro-Grids.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Alcaraz, Cristina;
Miciolino, Estefanía Etchevés;
Wolthusen, Stephen.
(2015)
Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs.
Springer
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2015)
Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks.
Norsk Informasjonssikkerhetskonferanse (NISK)
Academic article
-
Ambassa, Pacome L.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen;
Meinel, Christoph.
(2015)
Secure and Reliable Power Consumption
Monitoring in Untrustworthy Micro-grids.
Springer
Academic chapter/article/Conference paper
2014
-
Alwasel, Bader;
Wolthusen, Stephen.
(2014)
Reconstruction of Structural Controllability over Erd˝os-Rényi Graphs via Power Dominating Sets.
Association for Computing Machinery (ACM)
Academic chapter/article/Conference paper
-
Alcaraz, Cristina;
Wolthusen, Stephen.
(2014)
Recovery of Structural Controllability for Control Systems.
Springer
Academic chapter/article/Conference paper
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2014)
A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models.
IGI Global
Academic chapter/article/Conference paper
-
Baiocco, Alessio;
Wolthusen, Stephen.
(2014)
Stability of Power Network State Estimation Under Attack.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2014)
Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems.
Springer
Academic chapter/article/Conference paper
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2014)
Malicious MPLS Policy Engine Reconnaissance.
Springer
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2014)
Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.
Springer
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2014)
Mitigation of Cloud-Internal Denial of Service Attacks.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Baiocco, Alessio;
Wolthusen, Stephen;
Foglietta, Chiara;
Panzieri, Stefano.
(2014)
A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation.
IEEE conference proceedings
Academic chapter/article/Conference paper
2013
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2013)
Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2013)
Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures.
Springer
Academic chapter/article/Conference paper
-
Alcaraz, Cristina;
Miciolino, Estefanía Etchevés;
Wolthusen, Stephen.
(2013)
Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal.
Springer
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2013)
Robust Coordination of Cloud-Internal Denial of Service Attacks.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Weston, Peter;
Wolthusen, Stephen.
(2013)
Forensic Entropy Analysis of Microsoft Windows Storage Volumes.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2013)
An Analysis of Service Degradation Attacks against Real-Time MPLS Networks.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Bologna, Sandro;
Hämmerli, Bernhard Markus;
Gritzalis, Dimitris;
Wolthusen, Stephen.
(2013)
Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers.
Springer
Lecture Notes in Computer Science (LNCS) (6983)
Academic anthology/Conference proceedings
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2013)
Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation.
Springer
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2013)
Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines.
Springer
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2013)
Locating subverted processes using random packet comparison in SCADA systems.
International Journal of Critical Infrastructures
Academic article
-
Franke, Katrin;
Hjelmås, Erik;
Wolthusen, Stephen.
(2013)
Advancing Digital Forensics.
Springer
Academic chapter/article/Conference paper
-
Feng, Yangyue;
Foglietta, Chiara;
Baiocco, Alessio;
Panzieri, Stefano;
Wolthusen, Stephen.
(2013)
Malicious false data injection in hierarchical electric power grid state estimation systems.
ACM Publications
Academic chapter/article/Conference paper
2012
-
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2012)
Modelling Approaches.
Springer
Academic chapter/article/Conference paper
-
Lopez, Javier;
Setola, Roberto;
Wolthusen, Stephen.
(2012)
Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense.
Springer
Lecture Notes in Computer Science (LNCS) (7130)
Academic anthology/Conference proceedings
-
Lopez, Javier;
Setola, Roberto;
Wolthusen, Stephen.
(2012)
Overview of Critical Information Infrastructure Protection.
Springer
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2012)
Algorithmic approach for clandestine localisation and tracking in short-range environments.
International Journal of Communication Networks and Distributed Systems
Academic article
-
Seeger, Mark M.;
Wolthusen, Stephen.
(2012)
Towards Concurrent Data Sampling Using GPU Coprocessing.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
2011
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2011)
A Formal Adversary Capability Model for SCADA Environments.
Springer
Academic chapter/article/Conference paper
-
Xenakis, Christos;
Wolthusen, Stephen.
(2011)
Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers.
Springer
Lecture Notes in Computer Science (LNCS) (6712)
Academic anthology/Conference proceedings
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2011)
A Propagation Model of A Vulnerability Mitigation Computer Worm – Seawave.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2011)
On the feasibility of carrying out live real-time forensics for modern intelligent vehicles.
Springer
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2011)
Threat Analysis Model of an Agent-Based Vulnerability Mitigation Mechanism Using Bayesian Belief Networks.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Reidt, Steffen;
Ebinger, Peter;
Kuijper, Arjan;
Wolthusen, Stephen.
(2011)
Resource-Constrained Signal Propagation Modeling for Tactical Mobile Ad Hoc Networks.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
2010
-
Lunden, Nils;
Sveen, Robin;
Lund, Hans;
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2010)
Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments.
Springer
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
Host-Based Security Sensor Integrity in Multiprocessing Environments.
Springer
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks.
Springer
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
Forensic Tracking and Mobility Prediction in Vehicular Networks.
Springer
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes.
Springer
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion.
Springer
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2010)
Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2010)
Agent-based host enumeration and vulnerability scanning using dynamic topology information.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Seeger, Mark M.;
Wolthusen, Stephen.
(2010)
Observation mechanism and cost model for tightly coupled asymmetric concurrency.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Mairaj, Danish;
Wolthusen, Stephen;
Busch, Christoph.
(2010)
Teeth Segmentation and Feature Extraction for Odontological Biometrics.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Riedmüller, Reinhard;
Seeger, Mark M.;
Baier, Harald;
Busch, Christoph;
Wolthusen, Stephen.
(2010)
Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks.
Springer
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
Trouble Brewing: Using Observations of Invariant Behavior to Detect.
Springer
Academic chapter/article/Conference paper
2009
-
Reidt, Steffen;
Wolthusen, Stephen.
(2009)
Energy-efficient key distribution and revocation in tactical networks with asymmetric links.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Wolthusen, Stephen.
(2009)
Overcast: Forensic Discovery in Cloud Environments.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Ebinger, Peter;
Wolthusen, Stephen.
(2009)
Efficient state estimation and Byzantine behavior identification in Tactical MANETs.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2009)
Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Zhou, Xuebing;
Wolthusen, Stephen;
Busch, Christoph;
Kuijper, Arjan.
(2009)
Feature Correlation Attack on Biometric Privacy Protection Schemes.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2009)
Using Physical Models for Anomaly Detection in Control Systems.
Springer
Academic chapter/article/Conference paper
-
Busch, Christoph;
Wolthusen, Stephen.
(2009)
Non-Forensic Odontological Biometrics.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Zhou, Xuebing;
Wolthusen, Stephen;
Busch, Christoph;
Kuijper, Arjan.
(2009)
A Security Analysis of Biometric Template Protection Schemes.
Springer
Academic chapter/article/Conference paper
-
Borgen, Halvor;
Bours, Patrick;
Wolthusen, Stephen.
(2009)
Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance.
Springer
Academic chapter/article/Conference paper
-
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2009)
Modeling And Detecting Anomalies In Scada Systems.
Springer Science+Business Media B.V.
Academic chapter/article/Conference paper
Journal publications
-
Gajic, Natasa;
Wolthusen, Stephen Dirk Bjørn.
(2025)
Locally Optimal Information Pathways in the
Presence of Static Adversaries for a Hierarchical
Smart Distribution Grid Model.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gajic, Natasa;
Wolthusen, Stephen Dirk Bjørn.
(2024)
Improved Topology Generator with Hierarchical Information Overlay.
IFIP Advances in Information and Communication Technology
Academic article
-
Nweke, Livinus Obiora;
Weldehawaryat, Goitom Kahsay;
Wolthusen, Stephen Dirk Bjørn.
(2022)
Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466)).
International Journal of Critical Infrastructure Protection
Errata
-
Yeng, Prosper;
Wolthusen, Stephen Dirk Bjørn;
Yang, Bian.
(2021)
Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring.
International Journal of Advanced Computer Science and Applications (IJACSA)
Academic article
-
Nweke, Livinus Obiora;
Weldehawaryat, Goitom Kahsay;
Wolthusen, Stephen Dirk Bjørn.
(2021)
Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus.
International Journal of Critical Infrastructure Protection
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2021)
A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda.
Lecture Notes in Networks and Systems
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection.
International Conference on Cyber Conflict, CYCON
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
A Review of Asset-Centric Threat Modelling Approaches.
International Journal of Advanced Computer Science and Applications (IJACSA)
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection.
Wirtschaftsinformatik
Academic article
-
Nweke, Livinus Obiora;
Yeng, Prosper;
Wolthusen, Stephen;
Yang, Bian.
(2020)
Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices.
International Journal of Advanced Computer Science and Applications (IJACSA)
Academic article
-
Yeng, Prosper;
Wolthusen, Stephen Dirk Bjørn;
Yang, Bian.
(2020)
Legal requirements toward enhancing the security
of medical devices.
International Journal of Advanced Computer Science and Applications (IJACSA)
Academic literature review
-
Yeng, Prosper;
Wolthusen, Stephen Dirk Bjørn;
Yang, Bian.
(2020)
Comparative Analysis of Threat Modeling Methods
for Cloud Computing towards Healthcare Security
Practice.
International Journal of Advanced Computer Science and Applications (IJACSA)
Academic article
-
Gul, Ammara;
Wolthusen, Stephen.
(2019)
In-cycle sequential topology faults and attacks: Effects on state estimation.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Kavallieratos, Georgios;
Chowdhury, Nabin;
Katsikas, Sokratis;
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2019)
Threat Analysis for Smart Homes.
Future Internet
Academic article
-
Nweke, Livinus Obiora;
Wolthusen, Stephen;
Mancini, Luigi V..
(2019)
A Framework for the Validation of Network Artifacts.
Norsk Informasjonssikkerhetskonferanse (NISK)
Academic article
-
Wright, James G;
Wolthusen, Stephen.
(2018)
De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gul, Ammara;
Wolthusen, Stephen.
(2018)
Error propagation after reordering attacks on hierarchical state estimation.
IFIP Advances in Information and Communication Technology
Academic article
-
Baiocco, Alessio;
Wolthusen, Stephen.
(2018)
Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol.
IEEE Power & Energy Society General Meeting
Academic article
-
Darwish, Salaheddin;
Nouretdinov, Ilia;
Wolthusen, Stephen.
(2018)
A Dynamic Distributed Architecture
for Preserving Privacy of Medical IoT
Monitoring Measurements.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Wright, James G;
Wolthusen, Stephen.
(2017)
Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Kayem, Anne V.D.M.;
Meinel, Christoph;
Wolthusen, Stephen.
(2017)
A smart micro-grid architecture for resource constrained environments.
Advanced Information Networking and Applications
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
Security Requirements for the Deployment of Services Across Tactical SOA.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gkioulos, Vasileios;
Risthein, Erko;
Wolthusen, Stephen.
(2017)
TACTICS: Validation of the security framework developed for tactical SOA.
Journal of Information Security and Applications
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017.
Advances in Intelligent Systems and Computing
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures.
Advances in Intelligent Systems and Computing
Academic article
-
Weldehawaryat, Goitom Kahsay;
Ambassa, Pacome L.;
Marufu, Anesu M.C.;
Wolthusen, Stephen;
Kayem, Anne V.D.M..
(2017)
Decentralised scheduling of power consumption in micro-grids: Optimisation and security.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2017)
Power auctioning in resource constrained micro-grids: Cases of cheating.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Alcaraz, Cristina;
Lopez, Javier;
Wolthusen, Stephen.
(2017)
OCPP Protocol: Security Threats and Challenges.
IEEE Transactions on Smart Grid
Academic article
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2016)
MPLS Policy Target Recognition Network.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Almulla, Sameera;
Iraqi, Youssef;
Wolthusen, Stephen.
(2016)
Inferring relevance and presence of evidence in service-oriented and SaaS architectures.
Proceedings of the IEEE Symposium on Computers and Communications
Academic article
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2016)
A distributed continuous double auction framework for resource constrained microgrids.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2016)
Efficient security policy reconciliation in tactical service oriented architectures.
Communications in Computer and Information Science (CCIS)
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen;
Iossifides, Athanasios.
(2016)
A Survey on the Security Vulnerabilities of Cellular
Communication Systems (GSM-UMTS-LTE).
Norsk Informasjonssikkerhetskonferanse (NISK)
Academic article
-
Alwasel, Bader;
Wolthusen, Stephen.
(2016)
Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Alcaraz, Cristina;
Lopeza, Javier;
Wolthusen, Stephen.
(2016)
Policy enforcement system for secure interoperable control in distributed Smart Grid systems.
Journal of Network and Computer Applications
Academic article
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2015)
Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks.
Norsk Informasjonssikkerhetskonferanse (NISK)
Academic article
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2013)
Locating subverted processes using random packet comparison in SCADA systems.
International Journal of Critical Infrastructures
Academic article
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2012)
Algorithmic approach for clandestine localisation and tracking in short-range environments.
International Journal of Communication Networks and Distributed Systems
Academic article
Books
-
Bologna, Sandro;
Hämmerli, Bernhard Markus;
Gritzalis, Dimitris;
Wolthusen, Stephen.
(2013)
Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers.
Springer
Lecture Notes in Computer Science (LNCS) (6983)
Academic anthology/Conference proceedings
-
Lopez, Javier;
Setola, Roberto;
Wolthusen, Stephen.
(2012)
Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense.
Springer
Lecture Notes in Computer Science (LNCS) (7130)
Academic anthology/Conference proceedings
-
Xenakis, Christos;
Wolthusen, Stephen.
(2011)
Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers.
Springer
Lecture Notes in Computer Science (LNCS) (6712)
Academic anthology/Conference proceedings
Part of book/report
-
Gajic, Natasa;
Wolthusen, Stephen Dirk Bjørn.
(2024)
Adaptable Smart Distribution Grid Topology Generation for Enhanced Resilience.
Springer Berlin/Heidelberg
Academic chapter/article/Conference paper
-
Nweke, Livinus Obiora;
Weldehawaryat, Goitom Kahsay;
Wolthusen, Stephen.
(2020)
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Nweke, Livinus Obiora;
Wolthusen, Stephen.
(2020)
Resilience Analysis of Software-Defined Networks Using Queueing Networks.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Rigolin Ferreira Lopes, Roberto;
Nieminen, Mikko;
Viidanoja, Antti;
Wolthusen, Stephen.
(2017)
Reactive/Proactive Connectivity Management in a
Tactical Service-Oriented Infrastructure.
IEEE Sarnoff Symposium
Academic chapter/article/Conference paper
-
Ambassa, Pacome L.;
Wolthusen, Stephen;
Kayem, Anne V.D.M.;
Meinel, Christoph.
(2017)
Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids.
Springer
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen.
(2017)
A Security Policy Infrastructure for Tactical Service Oriented Architectures.
Springer
Academic chapter/article/Conference paper
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2017)
Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen D..
(2016)
Securing tactical service oriented architectures.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Ambassa, Pacome L.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen;
Meinel, Cristoph.
(2016)
Privacy Violations in Constrained Micro-grids: Adversarial Cases.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Gkioulos, Vasileios;
Wolthusen, Stephen;
Flizikowski, Adam;
Stachowicz, Anna;
Nogalski, Dariusz;
Gleba, Kamil.
(2016)
Interoperability of security and quality of Service Policies Over Tactical SOA.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Alwasel, Bader;
Wolthusen, Stephen.
(2016)
Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use.
Springer
Academic chapter/article/Conference paper
-
Baiocco, Alessio;
Foglietta, Chiara;
Wolthusen, Stephen.
(2016)
Delay and Jitter Attacks on Hierarchical State Estimation.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Kayem, Anne;
Strauss, Heinrich;
Wolthusen, Stephen D.;
Meinel, Christoph.
(2016)
Key Management for Secure Demand Data Communication in Constrained Micro-grids.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Marufu, Anesu M.C.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen.
(2016)
Fault-tolerant Distributed Continuous Double Auctioning on
Computationally Constrained Microgrids.
SciTePress
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2016)
An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms.
Springer
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2015)
Secure distributed demand projection in micro-grids.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2015)
Modelling Interdependencies over Incomplete Join
Structures of Power Law Networks.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Alwasel, Bader;
Wolthusen, Stephen.
(2015)
Structural Controllability Analysis via Embedding
Power Dominating Set Approximation in
Erd˝os-R´enyi Graphs.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Lopes, Roberto Rigolin Ferreira;
Wolthusen, Stephen.
(2015)
Distributed Security Policies for Service-Oriented
Architectures over Tactical Networks.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Ambassa, Pacome L.;
Wolthusen, Stephen;
Kayem, Anne V.D.M.;
Meinel, Christoph.
(2015)
Robust Snapshot Algorithm for Power Consumption Monitoring
in Computationally Constrained Micro-Grids.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Alcaraz, Cristina;
Miciolino, Estefanía Etchevés;
Wolthusen, Stephen.
(2015)
Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs.
Springer
Academic chapter/article/Conference paper
-
Ambassa, Pacome L.;
Kayem, Anne V.D.M.;
Wolthusen, Stephen;
Meinel, Christoph.
(2015)
Secure and Reliable Power Consumption
Monitoring in Untrustworthy Micro-grids.
Springer
Academic chapter/article/Conference paper
-
Alwasel, Bader;
Wolthusen, Stephen.
(2014)
Reconstruction of Structural Controllability over Erd˝os-Rényi Graphs via Power Dominating Sets.
Association for Computing Machinery (ACM)
Academic chapter/article/Conference paper
-
Alcaraz, Cristina;
Wolthusen, Stephen.
(2014)
Recovery of Structural Controllability for Control Systems.
Springer
Academic chapter/article/Conference paper
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2014)
A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models.
IGI Global
Academic chapter/article/Conference paper
-
Baiocco, Alessio;
Wolthusen, Stephen.
(2014)
Stability of Power Network State Estimation Under Attack.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2014)
Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems.
Springer
Academic chapter/article/Conference paper
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2014)
Malicious MPLS Policy Engine Reconnaissance.
Springer
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2014)
Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.
Springer
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2014)
Mitigation of Cloud-Internal Denial of Service Attacks.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Baiocco, Alessio;
Wolthusen, Stephen;
Foglietta, Chiara;
Panzieri, Stefano.
(2014)
A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom;
Wolthusen, Stephen.
(2013)
Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2013)
Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures.
Springer
Academic chapter/article/Conference paper
-
Alcaraz, Cristina;
Miciolino, Estefanía Etchevés;
Wolthusen, Stephen.
(2013)
Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal.
Springer
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2013)
Robust Coordination of Cloud-Internal Denial of Service Attacks.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Weston, Peter;
Wolthusen, Stephen.
(2013)
Forensic Entropy Analysis of Microsoft Windows Storage Volumes.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Al-Mutairi, Abdulrahman;
Wolthusen, Stephen.
(2013)
An Analysis of Service Degradation Attacks against Real-Time MPLS Networks.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2013)
Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation.
Springer
Academic chapter/article/Conference paper
-
Alarifi, Suaad;
Wolthusen, Stephen.
(2013)
Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines.
Springer
Academic chapter/article/Conference paper
-
Franke, Katrin;
Hjelmås, Erik;
Wolthusen, Stephen.
(2013)
Advancing Digital Forensics.
Springer
Academic chapter/article/Conference paper
-
Feng, Yangyue;
Foglietta, Chiara;
Baiocco, Alessio;
Panzieri, Stefano;
Wolthusen, Stephen.
(2013)
Malicious false data injection in hierarchical electric power grid state estimation systems.
ACM Publications
Academic chapter/article/Conference paper
-
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2012)
Modelling Approaches.
Springer
Academic chapter/article/Conference paper
-
Lopez, Javier;
Setola, Roberto;
Wolthusen, Stephen.
(2012)
Overview of Critical Information Infrastructure Protection.
Springer
Academic chapter/article/Conference paper
-
Seeger, Mark M.;
Wolthusen, Stephen.
(2012)
Towards Concurrent Data Sampling Using GPU Coprocessing.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2011)
A Formal Adversary Capability Model for SCADA Environments.
Springer
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2011)
A Propagation Model of A Vulnerability Mitigation Computer Worm – Seawave.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2011)
On the feasibility of carrying out live real-time forensics for modern intelligent vehicles.
Springer
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2011)
Threat Analysis Model of an Agent-Based Vulnerability Mitigation Mechanism Using Bayesian Belief Networks.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Reidt, Steffen;
Ebinger, Peter;
Kuijper, Arjan;
Wolthusen, Stephen.
(2011)
Resource-Constrained Signal Propagation Modeling for Tactical Mobile Ad Hoc Networks.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Lunden, Nils;
Sveen, Robin;
Lund, Hans;
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2010)
Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments.
Springer
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
Host-Based Security Sensor Integrity in Multiprocessing Environments.
Springer
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks.
Springer
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
Forensic Tracking and Mobility Prediction in Vehicular Networks.
Springer
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes.
Springer
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion.
Springer
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2010)
Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2010)
Agent-based host enumeration and vulnerability scanning using dynamic topology information.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Seeger, Mark M.;
Wolthusen, Stephen.
(2010)
Observation mechanism and cost model for tightly coupled asymmetric concurrency.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Mairaj, Danish;
Wolthusen, Stephen;
Busch, Christoph.
(2010)
Teeth Segmentation and Feature Extraction for Odontological Biometrics.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Riedmüller, Reinhard;
Seeger, Mark M.;
Baier, Harald;
Busch, Christoph;
Wolthusen, Stephen.
(2010)
Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Al-Kuwari, Saif;
Wolthusen, Stephen.
(2010)
A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks.
Springer
Academic chapter/article/Conference paper
-
McEvoy, Thomas Richard;
Wolthusen, Stephen.
(2010)
Trouble Brewing: Using Observations of Invariant Behavior to Detect.
Springer
Academic chapter/article/Conference paper
-
Reidt, Steffen;
Wolthusen, Stephen.
(2009)
Energy-efficient key distribution and revocation in tactical networks with asymmetric links.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Wolthusen, Stephen.
(2009)
Overcast: Forensic Discovery in Cloud Environments.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Ebinger, Peter;
Wolthusen, Stephen.
(2009)
Efficient state estimation and Byzantine behavior identification in Tactical MANETs.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Al-Salloum, Ziyad S.;
Wolthusen, Stephen.
(2009)
Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Zhou, Xuebing;
Wolthusen, Stephen;
Busch, Christoph;
Kuijper, Arjan.
(2009)
Feature Correlation Attack on Biometric Privacy Protection Schemes.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2009)
Using Physical Models for Anomaly Detection in Control Systems.
Springer
Academic chapter/article/Conference paper
-
Busch, Christoph;
Wolthusen, Stephen.
(2009)
Non-Forensic Odontological Biometrics.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Zhou, Xuebing;
Wolthusen, Stephen;
Busch, Christoph;
Kuijper, Arjan.
(2009)
A Security Analysis of Biometric Template Protection Schemes.
Springer
Academic chapter/article/Conference paper
-
Borgen, Halvor;
Bours, Patrick;
Wolthusen, Stephen.
(2009)
Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance.
Springer
Academic chapter/article/Conference paper
-
Svendsen, Nils Kalstad;
Wolthusen, Stephen.
(2009)
Modeling And Detecting Anomalies In Scada Systems.
Springer Science+Business Media B.V.
Academic chapter/article/Conference paper