Follow
Juan Lopez Jr.
Juan Lopez Jr.
Verified email at ornl.gov - Homepage
Title
Cited by
Cited by
Year
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
296*2006
Firmware modification attacks on programmable logic controllers
Z Basnight, J Butts, J Lopez Jr, T Dube
International Journal of Critical Infrastructure Protection 6 (2), 76-84, 2013
2102013
A framework for incorporating insurance in critical infrastructure cyber risk strategies
D Young, J Lopez Jr, M Rice, B Ramsey, R McTasney
International Journal of Critical Infrastructure Protection 14, 43-57, 2016
1062016
Cybert: Cybersecurity claim classification by fine-tuning the bert language model
K Ameri, M Hempel, H Sharif, J Lopez Jr, K Perumalla
Journal of Cybersecurity and Privacy 1 (4), 615-637, 2021
552021
Constructing cost-effective and targetable industrial control system honeypots for production networks
M Winn, M Rice, S Dunlap, J Lopez, B Mullins
International Journal of Critical Infrastructure Protection 10, 47-58, 2015
442015
JTAG-based PLC memory acquisition framework for industrial control systems
MH Rais, RA Awad, J Lopez Jr, I Ahmed
Forensic Science International: Digital Investigation 37, 301196, 2021
392021
Evaluation of security solutions in the SCADA environment
RD Larkin, J Lopez Jr, JW Butts, MR Grimaila
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 45 (1 …, 2014
382014
Automated reconstruction of control logic for programmable logic controller forensics
SA Qasim, J Lopez, I Ahmed
Information Security: 22nd International Conference, ISC 2019, New York City …, 2019
362019
Using timing-based side channels for anomaly detection in industrial control systems
S Dunlap, J Butts, J Lopez, M Rice, B Mullins
International Journal of Critical Infrastructure Protection 15, 12-26, 2016
332016
Industrial IoT cross-layer forensic investigation
CM Rondeau, MA Temple, J Lopez
WIREs Forensic Science 1, e1322, 2018
282018
A comparison of phy-based fingerprinting methods used to enhance network access control
TJ Carbino, MA Temple, J Lopez Jr
IFIP International Information Security and Privacy Conference, 204-217, 2015
242015
Memory forensic analysis of a programmable logic controller in industrial control systems
MH Rais, RA Awad, J Lopez Jr, I Ahmed
Forensic Science International: Digital Investigation 40, 301339, 2022
232022
Con-resistant trust for improved reliability in a smart-grid special protection system
CM Shipman, KM Hopkinson, J Lopez
IEEE Transactions on Power Delivery 30 (1), 455-462, 2014
232014
Enhancing critical infrastructure and key resources (CIKR) level-0 physical process security using field device distinct native attribute features
J Lopez, NC Liefer, CR Busho, MA Temple
IEEE Transactions on Information Forensics and Security 13 (5), 1215-1229, 2017
222017
Conditional constellation based-distinct native attribute (CB-DNA) fingerprinting for network device authentication
TJ Carbino, MA Temple, J Lopez
2016 IEEE International Conference on Communications (ICC), 1-6, 2016
212016
Analysis of programmable logic controller firmware for threat assessment and forensic investigation
Z Basnight, J Butts, J Lopez Jr, T Dube
Journal of Information Warfare 12 (2), 1-9, 2013
162013
Design of a novel information system for semi-automated management of cybersecurity in industrial control systems
K Ameri, M Hempel, H Sharif, J Lopez Jr, K Perumalla
ACM Transactions on Management Information Systems 14 (1), 1-35, 2023
142023
Survey of cybersecurity governance, threats, and countermeasures for the power grid
M Boeding, K Boswell, M Hempel, H Sharif, J Lopez Jr, K Perumalla
Energies 15 (22), 8692, 2022
142022
Volatile Memory Extraction-Based Approach for Level 0‐1 CPS Forensics
RA Awad, J Lopez, M Rogers
2019 IEEE International Symposium on Technologies for Homeland Security (HST …, 2019
142019
Practical application layer emulation in industrial control system honeypots
K Girtz, B Mullins, M Rice, J Lopez
Critical Infrastructure Protection X: 10th IFIP WG 11.10 International …, 2016
122016
The system can't perform the operation now. Try again later.
Articles 1–20