Role and challenges for sufficient cyber-attack attribution J Hunker, B Hutchinson, J Margulies Institute for Information Infrastructure Protection, 5-10, 2008 | 87 | 2008 |
Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices. LR Phillips, B Tejani, J Margulies, JL Hills, BT Richardson, MJ Baca, ... Sandia National Laboratories, 2005 | 45 | 2005 |
Designed-in Security for Cyber-Physical Systems S Peisert, J Margulies, DM Nicol, H Khurana, C Sawall IEEE Security & Privacy 12 (5), 9-12, 2014 | 32 | 2014 |
Garage Door Openers: An Internet of Things Case Study J Margulies IEEE Security & Privacy 13 (4), 80-83, 2015 | 28 | 2015 |
Attribution of cyber attacks on process control systems J Hunker, R Hutchinson, J Margulies International Conference on Critical Infrastructure Protection, 87-99, 2008 | 12 | 2008 |
A Developer's Guide to Audit Logging J Margulies IEEE Security & Privacy 13 (3), 84-86, 2015 | 9 | 2015 |
Control Systems Security from the Front Lines S Peisert, J Margulies, E Byres, P Dorey, D Peterson, Z Tudor IEEE Security & Privacy 12 (6), 55-58, 2014 | 6 | 2014 |
That Certificate You Bought Could Get You Hacked J Margulies, M Berg IEEE Security & Privacy 14 (5), 93-95, 2016 | 3 | 2016 |
Securing Cloud-Based Applications, Part 1 J Margulies IEEE Security & Privacy 13 (5), 96-98, 2015 | 1 | 2015 |
Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction] S Peisert, J Margulies IEEE Security & Privacy 12 (6), 13-14, 2014 | 1 | 2014 |
The Role of Attribution in Protecting PCS. RL Hutchinson, J Margulies Sandia National Laboratories Albuquerque, NM; Sandia National Laboratories …, 2011 | | 2011 |