Segui
Julian Rrushi
Julian Rrushi
Associate Professor, Oakland University
Email verificata su oakland.edu - Home page
Titolo
Citata da
Citata da
Anno
Introduction to cyberdeception
NC Rowe, J Rrushi
Springer International Publishing, 2016
972016
Detecting industrial control malware using automated PLC code analytics
S Zonouz, J Rrushi, S McLaughlin
IEEE Security & Privacy 12 (6), 40-47, 2014
952014
A quantitative evaluation of the target selection of havex ics malware plugin
J Rrushi, H Farhangi, C Howey, K Carmichael, J Dabell
Industrial control system security (ICSS) workshop, 1-5, 2015
412015
SCADA protocol vulnerabilities
JL Rrushi
Critical Infrastructure Protection: Information Infrastructure Models …, 2012
352012
Vulnerability analysis of SCADA protocol binaries through detection of memory access taintedness
C Bellettini, JL Rrushi
2007 IEEE SMC Information Assurance and Security Workshop, 341-348, 2007
352007
Detecting anomalies in process control networks
J Rrushi, KD Kang
Critical Infrastructure Protection III: Third Annual IFIP WG 11.10 …, 2009
322009
Composite intrusion detection in process control networks
J Rrushi
Università degli Studi di Milano, 2009
272009
Detecting cyber attacks on nuclear power plants
J Rrushi, R Campbell
Critical Infrastructure Protection II 2, 41-54, 2008
272008
An exploration of defensive deception in industrial communication networks
JL Rrushi
International Journal of Critical Infrastructure Protection 4 (2), 66-75, 2011
232011
NIC displays to thwart malware attacks mounted from within the OS
JL Rrushi
Computers & Security 61, 59-71, 2016
222016
Detecting attacks in power plant interfacing substations through probabilistic validation of attack-effect bindings
JL Rrushi, RH Campbell, U di Milano
SCADA Security Scientific Symposium, 2008
192008
Dnic architectural developments for 0-knowledge detection of opc malware
JL Rrushi
IEEE Transactions on Dependable and Secure Computing 18 (1), 30-44, 2018
182018
Physics Reasoning for Intrusion Detection in Industrial Networks
M Yahya, N Sharaf, J Rrushi, H Tay, B Liu, K Xu
IEEE International Conference on Trust, Privacy and Security in Intelligent …, 2020
172020
Honeypot Evader: Activity-guided Propagation versus Counter-evasion via Decoy OS Activity
J Rrushi
IEEE International Conference on Malicious and Unwanted Software, 2019
162019
A field study of digital forensics of intrusions in the electrical power grid
E Sohl, C Fielding, T Hanlon, J Rrushi, H Farhangi, C Howey, ...
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and …, 2015
162015
A product machine model for anomaly detection of interposition attacks on cyber-physical systems
C Bellettini, JL Rrushi
IFIP International Information Security Conference, 285-300, 2008
122008
Clustering Application for Data-Driven Prediction of Health Insurance Premiums for People of Different Ages
T Omar, A Alzahrani, M Zohdy, J Rrushi
IEEE International Conference on Consumer Electronics, 2021
92021
Protecting location privacy for crowd workers in spatial crowdsourcing using a novel dummy-based mechanism
RS Alharthi, E Aloufi, I Alrashdi, A Alqazzaz, MA Zohdy, JL Rrushi
IEEE Access 8, 114608-114622, 2020
92020
Machine Learning and Recognition of User Tasks for Malware Detection
Y Alagrash, N Mohan, SR Gollapalli, J Rrushi
IEEE International Conference on Trust, Privacy and Security in Intelligent …, 2019
92019
Keylogger detection using a decoy keyboard
S Simms, M Maxwell, S Johnson, J Rrushi
Data and Applications Security and Privacy XXXI: 31st Annual IFIP WG 11.3 …, 2017
92017
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20