Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 296* | 2006 |
Firmware modification attacks on programmable logic controllers Z Basnight, J Butts, J Lopez Jr, T Dube International Journal of Critical Infrastructure Protection 6 (2), 76-84, 2013 | 210 | 2013 |
A framework for incorporating insurance in critical infrastructure cyber risk strategies D Young, J Lopez Jr, M Rice, B Ramsey, R McTasney International Journal of Critical Infrastructure Protection 14, 43-57, 2016 | 106 | 2016 |
Cybert: Cybersecurity claim classification by fine-tuning the bert language model K Ameri, M Hempel, H Sharif, J Lopez Jr, K Perumalla Journal of Cybersecurity and Privacy 1 (4), 615-637, 2021 | 55 | 2021 |
Constructing cost-effective and targetable industrial control system honeypots for production networks M Winn, M Rice, S Dunlap, J Lopez, B Mullins International Journal of Critical Infrastructure Protection 10, 47-58, 2015 | 44 | 2015 |
JTAG-based PLC memory acquisition framework for industrial control systems MH Rais, RA Awad, J Lopez Jr, I Ahmed Forensic Science International: Digital Investigation 37, 301196, 2021 | 39 | 2021 |
Evaluation of security solutions in the SCADA environment RD Larkin, J Lopez Jr, JW Butts, MR Grimaila ACM SIGMIS Database: the DATABASE for Advances in Information Systems 45 (1 …, 2014 | 38 | 2014 |
Automated reconstruction of control logic for programmable logic controller forensics SA Qasim, J Lopez, I Ahmed Information Security: 22nd International Conference, ISC 2019, New York City …, 2019 | 36 | 2019 |
Using timing-based side channels for anomaly detection in industrial control systems S Dunlap, J Butts, J Lopez, M Rice, B Mullins International Journal of Critical Infrastructure Protection 15, 12-26, 2016 | 33 | 2016 |
Industrial IoT cross-layer forensic investigation CM Rondeau, MA Temple, J Lopez WIREs Forensic Science 1, e1322, 2018 | 28 | 2018 |
A comparison of phy-based fingerprinting methods used to enhance network access control TJ Carbino, MA Temple, J Lopez Jr IFIP International Information Security and Privacy Conference, 204-217, 2015 | 24 | 2015 |
Memory forensic analysis of a programmable logic controller in industrial control systems MH Rais, RA Awad, J Lopez Jr, I Ahmed Forensic Science International: Digital Investigation 40, 301339, 2022 | 23 | 2022 |
Con-resistant trust for improved reliability in a smart-grid special protection system CM Shipman, KM Hopkinson, J Lopez IEEE Transactions on Power Delivery 30 (1), 455-462, 2014 | 23 | 2014 |
Enhancing critical infrastructure and key resources (CIKR) level-0 physical process security using field device distinct native attribute features J Lopez, NC Liefer, CR Busho, MA Temple IEEE Transactions on Information Forensics and Security 13 (5), 1215-1229, 2017 | 22 | 2017 |
Conditional constellation based-distinct native attribute (CB-DNA) fingerprinting for network device authentication TJ Carbino, MA Temple, J Lopez 2016 IEEE International Conference on Communications (ICC), 1-6, 2016 | 21 | 2016 |
Analysis of programmable logic controller firmware for threat assessment and forensic investigation Z Basnight, J Butts, J Lopez Jr, T Dube Journal of Information Warfare 12 (2), 1-9, 2013 | 16 | 2013 |
Design of a novel information system for semi-automated management of cybersecurity in industrial control systems K Ameri, M Hempel, H Sharif, J Lopez Jr, K Perumalla ACM Transactions on Management Information Systems 14 (1), 1-35, 2023 | 14 | 2023 |
Survey of cybersecurity governance, threats, and countermeasures for the power grid M Boeding, K Boswell, M Hempel, H Sharif, J Lopez Jr, K Perumalla Energies 15 (22), 8692, 2022 | 14 | 2022 |
Volatile Memory Extraction-Based Approach for Level 0‐1 CPS Forensics RA Awad, J Lopez, M Rogers 2019 IEEE International Symposium on Technologies for Homeland Security (HST …, 2019 | 14 | 2019 |
Practical application layer emulation in industrial control system honeypots K Girtz, B Mullins, M Rice, J Lopez Critical Infrastructure Protection X: 10th IFIP WG 11.10 International …, 2016 | 12 | 2016 |