34 Publications (Page 1 of 2)
2021
Review of the Security of Backward-Compatible Automotive Inter-ECU CommunicationSharma, C.⋅Moylan, S.⋅Vasserman, E.Y. and Amariucai, G.T.IEEE Access, vol. 9, pp. 114854-114869.
| Journal Article
2020
(A Little) Ignorance is Bliss: The Effect of Imperfect Model Information on Stealthy Attacks in Power GridsHarshbarger, S.⋅Hosseinzadehtaher, M.⋅Natarajan, B.⋅Vasserman, E.⋅Shadmand, M. and Amariucai, G.2020 IEEE Kansas Power and Energy Conference, KPEC 2020.
| Conference Proceeding
Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems
ICST Transactions on Security and Safety. | Journal Article
Time series anomaly detection in medical break-the-glassTasali, Q.⋅Gyawali, N. and Vasserman, E.Y.ACM International Conference Proceeding Series, pp. 122-123.
| Conference Proceeding
2018
Challenges of distributed risk management for medical application platformsHatcliff, J.⋅Vasserman, E.Y.⋅Carpenter, T. and Whillock, R.ISPCE 2018 - IEEE Symposium on Product Compliance Engineering, Proceedings, pp. 1-14.
| Conference Proceeding
Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTRSchliep, Michael⋅Vasserman, Eugene and Hopper, NicholasProceedings on Privacy Enhancing Technologies, vol. 2018.
| Journal Article
2017
A framework of cybersecurity approaches in precision agricultureChi, H.⋅Welch, S.⋅Vasserman, E. and Kalaimannan, E.Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017, pp. 90-95.
| Conference Proceeding
A Roundtable Discussion: Thawing Out Healthcare Technology’s ‘Special Snowflake’ Cybersecurity ChallengesJensen, Robert D.⋅Copeland, Scot⋅Domas, Stephanie⋅Hampton, Rick⋅Hoyme, Ken⋅Jump, Michelle⋅Rekik, Inhel⋅Schwartz, Suzanne and Vasserman, EugeneBiomedical Instrumentation & Technology, vol. 51, pp. 10–16.
| Journal Article
Be Selfish and Avoid Dilemmas: Fork after Withholding (FAW) attacks on bitcoinKwon, Y.⋅Kim, D.⋅Son, Y.⋅Vasserman, E. and Kim, Y.Proceedings of the ACM Conference on Computer and Communications Security, pp. 195-209.
| Conference Proceeding
Do different mental models influence cybersecurity behavior? Evaluations via statistical reasoning performanceBrase, G.L.⋅Vasserman, E.Y. and Hsu, W.Frontiers in Psychology, vol. 8.
| Journal Article
Retrofitting communication security into a publish/subscribe middleware platformSalazar, C. and Vasserman, E.Y.2017
Safety-Focused Security Requirements Elicitation for Medical Device SoftwareLindvall, Mikael⋅Diep, Madeline⋅Klein, Michele⋅Jones, Paul⋅Zhang, Yi and Vasserman, EugeneIEEE.
| Conference Proceeding
Thawing out healthcare technology?s ?special snowflake? cybersecurity challengesJensen, R.D.⋅Copeland, S.⋅Domas, S.⋅Hampton, R.⋅Hoyme, K.⋅Jump, M.⋅Rekik, I.⋅Schwartz, S. and Vasserman, E.Biomedical Instrumentation and Technology, vol. 51, pp. 10-16.
| Journal Article
2016
An Exploratory Study of User Perceptions of Payment Methods in UK and the USKrol, Kat⋅Rahman, Muhammad Sajidur⋅Parkin, Simon⋅Cristofaro, Emiliano De and Vasserman, Eugene Y.Internet Society.
| Conference Proceeding
Simple and compact flow fingerprinting robust to transit through low-latency anonymous networksXue, Yang and Vasserman, Eugene Y.IEEE.
| Conference Proceeding
2015
Developing and Piloting a Quantitative Assessment Tool for Cybersecurity CoursesBell, R.S.⋅Vasserman, E. and Sayre, E.C.ASEE Annual Conference and Exposition, Conference Proceedings, vol. 122nd ASEE Annual Conference and Exposition: Making Value for Society.
| Conference Proceeding
Practicality of using side-channel analysis for software integrity checking of embedded systemsLiu, Hong⋅Liu, H.⋅Li, Hongmin⋅Li, H.⋅Vasserman, Eugene Y. and Vasserman, E.Y.2015
Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded SystemsLiu, Hong⋅Liu, H.⋅Li, Hongmin⋅Li, H.⋅Vasserman, Eugene Y. and Vasserman, E.Y.(pp. 277–293). Springer International Publishing
2014
A longitudinal study of students in an introductory cybersecurity courseBell, R.S.⋅Vasserman, E.Y. and Sayre, E.C.ASEE Annual Conference and Exposition, Conference Proceedings.
| Conference Proceeding
A roundtable discussion: Safeguarding information and resources against emerging cybersecurity threatsLoughlin, S.⋅Fu, K.⋅Gee, T.⋅Gieras, I.⋅Hoyme, K.⋅Rajagopalan, S.R.⋅Ransford, B.⋅Vasserman, E. and Wirth, A.Biomedical Instrumentation and Technology, vol. 48, pp. 8-17.
| Journal Article
Foundational Security Principles for Medical Application Platforms (Extended Abstract).Vasserman, Eugene Y and Hatcliff, JohnInformation security applications : 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers / Yongdae Kim, Heejo Lee, Adrian Perrig (eds.). WISA (Workshop : Information security) (14th : ..., vol. 8267, pp. 213-217.
| Journal Article
Functional Alarms for Systems of Interoperable Medical Devices.Venkatasubramanian, Krishna K⋅Vasserman, Eugene Y⋅Sokolsky, Oleg and Lee, InsupProceedings / IEEE International Symposium on High-Assurance Systems Engineering. IEEE International Symposium on High-Assurance Systems Engineering, vol. 2014, pp. 247-248, January 2014.
| Journal Article
2013
Improved group off-the-record messagingLiu, H.⋅Vasserman, E.Y. and Hopper, N.Proceedings of the ACM Conference on Computer and Communications Security, pp. 249-254.
| Conference Proceeding
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and TradeoffsMohaien, Abedelaziz⋅Kune, Denis F⋅Vasserman, Eugene Y⋅Kim, Myungsun and Kim, YongdaeIEEE Transactions on Dependable and Secure Computing, vol. 10, (no. 6), Nov/Dec 2013.
| Journal Article
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor NetworksVasserman, E. Y. and Hopper, N.IEEE Transactions on Mobile Computing, vol. 12, pp. 318–332.
| Journal Article