Navigasjon

  • Hopp til innhold
NTNU Hjemmeside

ntnu.no

  • Studier
    • Studieprogram
    • Søk opptak
    • Forkurs og oppfriskning
    • Videreutdanning og deltid
    • Studere på NTNU
  • Studentliv
    • Student i Gjøvik
    • Student i Trondheim
    • Student i Ålesund
    • Derfor velger vi NTNU
  • Forskning og innovasjon
    • Forskning
    • Innovasjon
    • Satsingsområder
    • Toppforskning
    • Ekspertlister
    • Ph.d.
  • Om NTNU
    • Fakulteter og institutter
    • Sentre
    • Bibliotek
    • Kart
    • Ledige stillinger
    • Arrangement
    • Nyheter
    • Kontakt oss
    • Om NTNU
  1. Hjem
  2. Ansatte

Språkvelger

English

Stephen Dirk Bjørn Wolthusen

Stephen Dirk Bjørn Wolthusen

Professor
Institutt for informasjonssikkerhet og kommunikasjonsteknologi

stephen.wolthusen@ntnu.no
61135289 Ametyst-bygget, Gjøvik
Publikasjoner Undervisning

Publikasjoner

  • Kronologisk
  • Etter kategori
  • Se alle publikasjoner i Cristin

2022

  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. (2022) Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466)). International Journal of Critical Infrastructure Protection
    Errata

2021

  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. (2021) Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus. International Journal of Critical Infrastructure Protection
    Vitenskapelig artikkel
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2021) Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring. International Journal of Advanced Computer Science and Applications (IJACSA)
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2021) A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda. Lecture Notes in Networks and Systems
    Vitenskapelig artikkel

2020

  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Resilience Analysis of Software-Defined Networks Using Queueing Networks. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen. (2020) Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2020) Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice. International Journal of Advanced Computer Science and Applications (IJACSA)
    Vitenskapelig artikkel
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2020) Legal requirements toward enhancing the security of medical devices. International Journal of Advanced Computer Science and Applications (IJACSA)
    Vitenskapelig oversiktsartikkel/review
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection. Wirtschaftsinformatik
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) A Review of Asset-Centric Threat Modelling Approaches. International Journal of Advanced Computer Science and Applications (IJACSA)
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Yeng, Prosper; Wolthusen, Stephen; Yang, Bian. (2020) Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices. International Journal of Advanced Computer Science and Applications (IJACSA)
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection. International Conference on Cyber Conflict, CYCON
    Vitenskapelig artikkel

2019

  • Gul, Ammara; Wolthusen, Stephen. (2019) In-cycle sequential topology faults and attacks: Effects on state estimation. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen; Mancini, Luigi V.. (2019) A Framework for the Validation of Network Artifacts. Norsk Informasjonssikkerhetskonferanse (NISK)
    Vitenskapelig artikkel
  • Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen. (2019) Threat Analysis for Smart Homes. Future Internet
    Vitenskapelig artikkel

2018

  • Wright, James G; Wolthusen, Stephen. (2018) De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Darwish, Salaheddin; Nouretdinov, Ilia; Wolthusen, Stephen. (2018) A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Baiocco, Alessio; Wolthusen, Stephen. (2018) Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol. IEEE Power & Energy Society General Meeting
    Vitenskapelig artikkel
  • Gul, Ammara; Wolthusen, Stephen. (2018) Error propagation after reordering attacks on hierarchical state estimation. IFIP Advances in Information and Communication Technology
    Vitenskapelig artikkel

2017

  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures. Advances in Intelligent Systems and Computing
    Vitenskapelig artikkel
  • Alcaraz, Cristina; Lopez, Javier; Wolthusen, Stephen. (2017) OCPP Protocol: Security Threats and Challenges. IEEE Transactions on Smart Grid
    Vitenskapelig artikkel
  • Weldehawaryat, Goitom Kahsay; Ambassa, Pacome L.; Marufu, Anesu M.C.; Wolthusen, Stephen; Kayem, Anne V.D.M.. (2017) Decentralised scheduling of power consumption in micro-grids: Optimisation and security. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Rigolin Ferreira Lopes, Roberto; Nieminen, Mikko; Viidanoja, Antti; Wolthusen, Stephen. (2017) Reactive/Proactive Connectivity Management in a Tactical Service-Oriented Infrastructure. IEEE Sarnoff Symposium
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017. Advances in Intelligent Systems and Computing
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Security Requirements for the Deployment of Services Across Tactical SOA. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Risthein, Erko; Wolthusen, Stephen. (2017) TACTICS: Validation of the security framework developed for tactical SOA. Journal of Information Security and Applications
    Vitenskapelig artikkel
  • Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph. (2017) Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) A Security Policy Infrastructure for Tactical Service Oriented Architectures. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Kayem, Anne V.D.M.; Meinel, Christoph; Wolthusen, Stephen. (2017) A smart micro-grid architecture for resource constrained environments. Advanced Information Networking and Applications
    Vitenskapelig artikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2017) Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2017) Power auctioning in resource constrained micro-grids: Cases of cheating. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Wright, James G; Wolthusen, Stephen. (2017) Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2016

  • Gkioulos, Vasileios; Wolthusen, Stephen. (2016) Efficient security policy reconciliation in tactical service oriented architectures. Communications in Computer and Information Science
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen; Iossifides, Athanasios. (2016) A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE). Norsk Informasjonssikkerhetskonferanse (NISK)
    Vitenskapelig artikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2016) An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2016) Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen; Flizikowski, Adam; Stachowicz, Anna; Nogalski, Dariusz; Gleba, Kamil. (2016) Interoperability of security and quality of Service Policies Over Tactical SOA. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Kayem, Anne; Strauss, Heinrich; Wolthusen, Stephen D.; Meinel, Christoph. (2016) Key Management for Secure Demand Data Communication in Constrained Micro-grids. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Baiocco, Alessio; Foglietta, Chiara; Wolthusen, Stephen. (2016) Delay and Jitter Attacks on Hierarchical State Estimation. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Almulla, Sameera; Iraqi, Youssef; Wolthusen, Stephen. (2016) Inferring relevance and presence of evidence in service-oriented and SaaS architectures. Proceedings of the IEEE Symposium on Computers and Communications
    Vitenskapelig artikkel
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2016) MPLS Policy Target Recognition Network. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2016) Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2016) A distributed continuous double auction framework for resource constrained microgrids. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Cristoph. (2016) Privacy Violations in Constrained Micro-grids: Adversarial Cases. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alcaraz, Cristina; Lopeza, Javier; Wolthusen, Stephen. (2016) Policy enforcement system for secure interoperable control in distributed Smart Grid systems. Journal of Network and Computer Applications
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen D.. (2016) Securing tactical service oriented architectures. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2016) Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. SciTePress
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2015

  • Lopes, Roberto Rigolin Ferreira; Wolthusen, Stephen. (2015) Distributed Security Policies for Service-Oriented Architectures over Tactical Networks. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Christoph. (2015) Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2015) Modelling Interdependencies over Incomplete Join Structures of Power Law Networks. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2015) Structural Controllability Analysis via Embedding Power Dominating Set Approximation in Erd˝os-R´enyi Graphs. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2015) Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks. Norsk Informasjonssikkerhetskonferanse (NISK)
    Vitenskapelig artikkel
  • Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen. (2015) Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph. (2015) Robust Snapshot Algorithm for Power Consumption Monitoring in Computationally Constrained Micro-Grids. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2015) Secure distributed demand projection in micro-grids. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2014

  • Alarifi, Suaad; Wolthusen, Stephen. (2014) Mitigation of Cloud-Internal Denial of Service Attacks. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Baiocco, Alessio; Wolthusen, Stephen; Foglietta, Chiara; Panzieri, Stefano. (2014) A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alcaraz, Cristina; Wolthusen, Stephen. (2014) Recovery of Structural Controllability for Control Systems. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2014) Malicious MPLS Policy Engine Reconnaissance. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2014) Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2014) Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Baiocco, Alessio; Wolthusen, Stephen. (2014) Stability of Power Network State Estimation Under Attack. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2014) Reconstruction of Structural Controllability over Erd˝os-Rényi Graphs via Power Dominating Sets. Association for Computing Machinery (ACM)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2014) A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models. IGI Global
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2013

  • Alarifi, Suaad; Wolthusen, Stephen. (2013) Robust Coordination of Cloud-Internal Denial of Service Attacks. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weston, Peter; Wolthusen, Stephen. (2013) Forensic Entropy Analysis of Microsoft Windows Storage Volumes. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2013) An Analysis of Service Degradation Attacks against Real-Time MPLS Networks. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Bologna, Sandro; Hämmerli, Bernhard Markus; Gritzalis, Dimitris; Wolthusen, Stephen. (2013) Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers. Springer Lecture Notes in Computer Science (LNCS) (6983)
    Vitenskapelig antologi/Konferanseserie
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2013) Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2013) Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Locating subverted processes using random packet comparison in SCADA systems. International Journal of Critical Infrastructures
    Vitenskapelig artikkel
  • Feng, Yangyue; Foglietta, Chiara; Baiocco, Alessio; Panzieri, Stefano; Wolthusen, Stephen. (2013) Malicious false data injection in hierarchical electric power grid state estimation systems. ACM Publications
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Franke, Katrin; Hjelmås, Erik; Wolthusen, Stephen. (2013) Advancing Digital Forensics. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen. (2013) Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2012

  • Al-Kuwari, Saif; Wolthusen, Stephen. (2012) Algorithmic approach for clandestine localisation and tracking in short-range environments. International Journal of Communication Networks and Distributed Systems
    Vitenskapelig artikkel
  • Lopez, Javier; Setola, Roberto; Wolthusen, Stephen. (2012) Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer Lecture Notes in Computer Science (LNCS) (7130)
    Vitenskapelig antologi/Konferanseserie
  • Lopez, Javier; Setola, Roberto; Wolthusen, Stephen. (2012) Overview of Critical Information Infrastructure Protection. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2012) Modelling Approaches. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Seeger, Mark M.; Wolthusen, Stephen. (2012) Towards Concurrent Data Sampling Using GPU Coprocessing. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2011

  • Reidt, Steffen; Ebinger, Peter; Kuijper, Arjan; Wolthusen, Stephen. (2011) Resource-Constrained Signal Propagation Modeling for Tactical Mobile Ad Hoc Networks. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2011) Threat Analysis Model of an Agent-Based Vulnerability Mitigation Mechanism Using Bayesian Belief Networks. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2011) A Propagation Model of A Vulnerability Mitigation Computer Worm – Seawave. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2011) On the feasibility of carrying out live real-time forensics for modern intelligent vehicles. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Xenakis, Christos; Wolthusen, Stephen. (2011) Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers. Springer Lecture Notes in Computer Science (LNCS) (6712)
    Vitenskapelig antologi/Konferanseserie
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2011) A Formal Adversary Capability Model for SCADA Environments. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2010

  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Trouble Brewing: Using Observations of Invariant Behavior to Detect. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2010) Agent-based host enumeration and vulnerability scanning using dynamic topology information. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Seeger, Mark M.; Wolthusen, Stephen. (2010) Observation mechanism and cost model for tightly coupled asymmetric concurrency. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Forensic Tracking and Mobility Prediction in Vehicular Networks. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Host-Based Security Sensor Integrity in Multiprocessing Environments. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Mairaj, Danish; Wolthusen, Stephen; Busch, Christoph. (2010) Teeth Segmentation and Feature Extraction for Odontological Biometrics. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Riedmüller, Reinhard; Seeger, Mark M.; Baier, Harald; Busch, Christoph; Wolthusen, Stephen. (2010) Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Lunden, Nils; Sveen, Robin; Lund, Hans; Svendsen, Nils Kalstad; Wolthusen, Stephen. (2010) Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2010) Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2009

  • Borgen, Halvor; Bours, Patrick; Wolthusen, Stephen. (2009) Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2009) Using Physical Models for Anomaly Detection in Control Systems. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Busch, Christoph; Wolthusen, Stephen. (2009) Non-Forensic Odontological Biometrics. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2009) Modeling And Detecting Anomalies In Scada Systems. Springer Science+Business Media B.V.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Zhou, Xuebing; Wolthusen, Stephen; Busch, Christoph; Kuijper, Arjan. (2009) A Security Analysis of Biometric Template Protection Schemes. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ebinger, Peter; Wolthusen, Stephen. (2009) Efficient state estimation and Byzantine behavior identification in Tactical MANETs. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Wolthusen, Stephen. (2009) Overcast: Forensic Discovery in Cloud Environments. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Zhou, Xuebing; Wolthusen, Stephen; Busch, Christoph; Kuijper, Arjan. (2009) Feature Correlation Attack on Biometric Privacy Protection Schemes. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2009) Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Reidt, Steffen; Wolthusen, Stephen. (2009) Energy-efficient key distribution and revocation in tactical networks with asymmetric links. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

Tidsskriftspublikasjoner

  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. (2022) Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466)). International Journal of Critical Infrastructure Protection
    Errata
  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. (2021) Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus. International Journal of Critical Infrastructure Protection
    Vitenskapelig artikkel
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2021) Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring. International Journal of Advanced Computer Science and Applications (IJACSA)
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2021) A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda. Lecture Notes in Networks and Systems
    Vitenskapelig artikkel
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2020) Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice. International Journal of Advanced Computer Science and Applications (IJACSA)
    Vitenskapelig artikkel
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2020) Legal requirements toward enhancing the security of medical devices. International Journal of Advanced Computer Science and Applications (IJACSA)
    Vitenskapelig oversiktsartikkel/review
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection. Wirtschaftsinformatik
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) A Review of Asset-Centric Threat Modelling Approaches. International Journal of Advanced Computer Science and Applications (IJACSA)
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Yeng, Prosper; Wolthusen, Stephen; Yang, Bian. (2020) Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices. International Journal of Advanced Computer Science and Applications (IJACSA)
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection. International Conference on Cyber Conflict, CYCON
    Vitenskapelig artikkel
  • Gul, Ammara; Wolthusen, Stephen. (2019) In-cycle sequential topology faults and attacks: Effects on state estimation. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen; Mancini, Luigi V.. (2019) A Framework for the Validation of Network Artifacts. Norsk Informasjonssikkerhetskonferanse (NISK)
    Vitenskapelig artikkel
  • Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen. (2019) Threat Analysis for Smart Homes. Future Internet
    Vitenskapelig artikkel
  • Wright, James G; Wolthusen, Stephen. (2018) De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Darwish, Salaheddin; Nouretdinov, Ilia; Wolthusen, Stephen. (2018) A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Baiocco, Alessio; Wolthusen, Stephen. (2018) Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol. IEEE Power & Energy Society General Meeting
    Vitenskapelig artikkel
  • Gul, Ammara; Wolthusen, Stephen. (2018) Error propagation after reordering attacks on hierarchical state estimation. IFIP Advances in Information and Communication Technology
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures. Advances in Intelligent Systems and Computing
    Vitenskapelig artikkel
  • Alcaraz, Cristina; Lopez, Javier; Wolthusen, Stephen. (2017) OCPP Protocol: Security Threats and Challenges. IEEE Transactions on Smart Grid
    Vitenskapelig artikkel
  • Weldehawaryat, Goitom Kahsay; Ambassa, Pacome L.; Marufu, Anesu M.C.; Wolthusen, Stephen; Kayem, Anne V.D.M.. (2017) Decentralised scheduling of power consumption in micro-grids: Optimisation and security. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017. Advances in Intelligent Systems and Computing
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Security Requirements for the Deployment of Services Across Tactical SOA. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Risthein, Erko; Wolthusen, Stephen. (2017) TACTICS: Validation of the security framework developed for tactical SOA. Journal of Information Security and Applications
    Vitenskapelig artikkel
  • Kayem, Anne V.D.M.; Meinel, Christoph; Wolthusen, Stephen. (2017) A smart micro-grid architecture for resource constrained environments. Advanced Information Networking and Applications
    Vitenskapelig artikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2017) Power auctioning in resource constrained micro-grids: Cases of cheating. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Wright, James G; Wolthusen, Stephen. (2017) Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2016) Efficient security policy reconciliation in tactical service oriented architectures. Communications in Computer and Information Science
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen; Iossifides, Athanasios. (2016) A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE). Norsk Informasjonssikkerhetskonferanse (NISK)
    Vitenskapelig artikkel
  • Almulla, Sameera; Iraqi, Youssef; Wolthusen, Stephen. (2016) Inferring relevance and presence of evidence in service-oriented and SaaS architectures. Proceedings of the IEEE Symposium on Computers and Communications
    Vitenskapelig artikkel
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2016) MPLS Policy Target Recognition Network. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2016) Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2016) A distributed continuous double auction framework for resource constrained microgrids. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Alcaraz, Cristina; Lopeza, Javier; Wolthusen, Stephen. (2016) Policy enforcement system for secure interoperable control in distributed Smart Grid systems. Journal of Network and Computer Applications
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2015) Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks. Norsk Informasjonssikkerhetskonferanse (NISK)
    Vitenskapelig artikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Locating subverted processes using random packet comparison in SCADA systems. International Journal of Critical Infrastructures
    Vitenskapelig artikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2012) Algorithmic approach for clandestine localisation and tracking in short-range environments. International Journal of Communication Networks and Distributed Systems
    Vitenskapelig artikkel

Bøker

  • Bologna, Sandro; Hämmerli, Bernhard Markus; Gritzalis, Dimitris; Wolthusen, Stephen. (2013) Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers. Springer Lecture Notes in Computer Science (LNCS) (6983)
    Vitenskapelig antologi/Konferanseserie
  • Lopez, Javier; Setola, Roberto; Wolthusen, Stephen. (2012) Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer Lecture Notes in Computer Science (LNCS) (7130)
    Vitenskapelig antologi/Konferanseserie
  • Xenakis, Christos; Wolthusen, Stephen. (2011) Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers. Springer Lecture Notes in Computer Science (LNCS) (6712)
    Vitenskapelig antologi/Konferanseserie

Del av bok/rapport

  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Resilience Analysis of Software-Defined Networks Using Queueing Networks. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen. (2020) Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Rigolin Ferreira Lopes, Roberto; Nieminen, Mikko; Viidanoja, Antti; Wolthusen, Stephen. (2017) Reactive/Proactive Connectivity Management in a Tactical Service-Oriented Infrastructure. IEEE Sarnoff Symposium
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph. (2017) Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) A Security Policy Infrastructure for Tactical Service Oriented Architectures. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2017) Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2016) An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2016) Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen; Flizikowski, Adam; Stachowicz, Anna; Nogalski, Dariusz; Gleba, Kamil. (2016) Interoperability of security and quality of Service Policies Over Tactical SOA. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Kayem, Anne; Strauss, Heinrich; Wolthusen, Stephen D.; Meinel, Christoph. (2016) Key Management for Secure Demand Data Communication in Constrained Micro-grids. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Baiocco, Alessio; Foglietta, Chiara; Wolthusen, Stephen. (2016) Delay and Jitter Attacks on Hierarchical State Estimation. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Cristoph. (2016) Privacy Violations in Constrained Micro-grids: Adversarial Cases. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen D.. (2016) Securing tactical service oriented architectures. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2016) Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. SciTePress
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Lopes, Roberto Rigolin Ferreira; Wolthusen, Stephen. (2015) Distributed Security Policies for Service-Oriented Architectures over Tactical Networks. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Christoph. (2015) Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2015) Modelling Interdependencies over Incomplete Join Structures of Power Law Networks. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2015) Structural Controllability Analysis via Embedding Power Dominating Set Approximation in Erd˝os-R´enyi Graphs. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen. (2015) Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph. (2015) Robust Snapshot Algorithm for Power Consumption Monitoring in Computationally Constrained Micro-Grids. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2015) Secure distributed demand projection in micro-grids. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2014) Mitigation of Cloud-Internal Denial of Service Attacks. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Baiocco, Alessio; Wolthusen, Stephen; Foglietta, Chiara; Panzieri, Stefano. (2014) A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alcaraz, Cristina; Wolthusen, Stephen. (2014) Recovery of Structural Controllability for Control Systems. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2014) Malicious MPLS Policy Engine Reconnaissance. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2014) Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2014) Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Baiocco, Alessio; Wolthusen, Stephen. (2014) Stability of Power Network State Estimation Under Attack. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2014) Reconstruction of Structural Controllability over Erd˝os-Rényi Graphs via Power Dominating Sets. Association for Computing Machinery (ACM)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2014) A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models. IGI Global
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2013) Robust Coordination of Cloud-Internal Denial of Service Attacks. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weston, Peter; Wolthusen, Stephen. (2013) Forensic Entropy Analysis of Microsoft Windows Storage Volumes. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2013) An Analysis of Service Degradation Attacks against Real-Time MPLS Networks. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2013) Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2013) Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Feng, Yangyue; Foglietta, Chiara; Baiocco, Alessio; Panzieri, Stefano; Wolthusen, Stephen. (2013) Malicious false data injection in hierarchical electric power grid state estimation systems. ACM Publications
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Franke, Katrin; Hjelmås, Erik; Wolthusen, Stephen. (2013) Advancing Digital Forensics. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen. (2013) Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Lopez, Javier; Setola, Roberto; Wolthusen, Stephen. (2012) Overview of Critical Information Infrastructure Protection. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2012) Modelling Approaches. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Seeger, Mark M.; Wolthusen, Stephen. (2012) Towards Concurrent Data Sampling Using GPU Coprocessing. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Reidt, Steffen; Ebinger, Peter; Kuijper, Arjan; Wolthusen, Stephen. (2011) Resource-Constrained Signal Propagation Modeling for Tactical Mobile Ad Hoc Networks. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2011) Threat Analysis Model of an Agent-Based Vulnerability Mitigation Mechanism Using Bayesian Belief Networks. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2011) A Propagation Model of A Vulnerability Mitigation Computer Worm – Seawave. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2011) On the feasibility of carrying out live real-time forensics for modern intelligent vehicles. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2011) A Formal Adversary Capability Model for SCADA Environments. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Trouble Brewing: Using Observations of Invariant Behavior to Detect. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2010) Agent-based host enumeration and vulnerability scanning using dynamic topology information. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Seeger, Mark M.; Wolthusen, Stephen. (2010) Observation mechanism and cost model for tightly coupled asymmetric concurrency. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Forensic Tracking and Mobility Prediction in Vehicular Networks. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Host-Based Security Sensor Integrity in Multiprocessing Environments. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Mairaj, Danish; Wolthusen, Stephen; Busch, Christoph. (2010) Teeth Segmentation and Feature Extraction for Odontological Biometrics. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Riedmüller, Reinhard; Seeger, Mark M.; Baier, Harald; Busch, Christoph; Wolthusen, Stephen. (2010) Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Lunden, Nils; Sveen, Robin; Lund, Hans; Svendsen, Nils Kalstad; Wolthusen, Stephen. (2010) Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2010) Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Borgen, Halvor; Bours, Patrick; Wolthusen, Stephen. (2009) Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2009) Using Physical Models for Anomaly Detection in Control Systems. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Busch, Christoph; Wolthusen, Stephen. (2009) Non-Forensic Odontological Biometrics. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2009) Modeling And Detecting Anomalies In Scada Systems. Springer Science+Business Media B.V.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Zhou, Xuebing; Wolthusen, Stephen; Busch, Christoph; Kuijper, Arjan. (2009) A Security Analysis of Biometric Template Protection Schemes. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ebinger, Peter; Wolthusen, Stephen. (2009) Efficient state estimation and Byzantine behavior identification in Tactical MANETs. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Wolthusen, Stephen. (2009) Overcast: Forensic Discovery in Cloud Environments. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Zhou, Xuebing; Wolthusen, Stephen; Busch, Christoph; Kuijper, Arjan. (2009) Feature Correlation Attack on Biometric Privacy Protection Schemes. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2009) Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination. IEEE (Institute of Electrical and Electronics Engineers)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Reidt, Steffen; Wolthusen, Stephen. (2009) Energy-efficient key distribution and revocation in tactical networks with asymmetric links. IEEE conference proceedings
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

Undervisning

Emner

  • IMT4125 - Network Security
  • IMT4203 - Kritisk infrastruktur - sikkerhet
  • IIKG6502 - Kritisk infrastruktur - sikkerhet
  • IMT6003 - IIK Sommerskole
  • IMT6011 - Introduction to Information Security
NTNU kunnsap for en bedre verden
Studere
  • Studieprogram
  • Emner
  • Videreutdanning og deltid
  • Jobbmuligheter
  • Karriereutvikling
  • Studentaktiviteter
  • Studentblogger
  • Hvorfor velge NTNU
Kontakt
  • Kontakt oss
  • Finn ansatte
  • Skolebesøk og messer
  • Spør en ekspert
  • For alumni
  • Pressekontakter
Oppdag NTNU
  • Arrangement
  • Jobbe ved NTNU
  • Bilder og video
  • Nyheter
  • Kart
  • NTNU i Gjøvik
  • NTNU i Trondheim
  • NTNU i Ålesund
Om NTNU
  • Strategi
  • Forskning
  • Satsingsområder
  • Innovasjon
  • Utdanningskvalitet
  • Organisasjonskart
  • Om NTNU
Tjenester
  • For ansatte
  • For studenter
  • Blackboard
  • Innsida

Norges teknisk-naturvitenskapelige universitet

Bruk av informasjonskapsler
Tilgjengelighetserklæring
Personvern
Ansvarlig redaktør
Logg inn