Segui
Jonathan Margulies
Jonathan Margulies
Evil Associates
Email verificata su evil.associates
Titolo
Citata da
Citata da
Anno
Role and challenges for sufficient cyber-attack attribution
J Hunker, B Hutchinson, J Margulies
Institute for Information Infrastructure Protection, 5-10, 2008
872008
Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.
LR Phillips, B Tejani, J Margulies, JL Hills, BT Richardson, MJ Baca, ...
Sandia National Laboratories, 2005
452005
Designed-in Security for Cyber-Physical Systems
S Peisert, J Margulies, DM Nicol, H Khurana, C Sawall
IEEE Security & Privacy 12 (5), 9-12, 2014
322014
Garage Door Openers: An Internet of Things Case Study
J Margulies
IEEE Security & Privacy 13 (4), 80-83, 2015
282015
Attribution of cyber attacks on process control systems
J Hunker, R Hutchinson, J Margulies
International Conference on Critical Infrastructure Protection, 87-99, 2008
122008
A Developer's Guide to Audit Logging
J Margulies
IEEE Security & Privacy 13 (3), 84-86, 2015
92015
Control Systems Security from the Front Lines
S Peisert, J Margulies, E Byres, P Dorey, D Peterson, Z Tudor
IEEE Security & Privacy 12 (6), 55-58, 2014
62014
That Certificate You Bought Could Get You Hacked
J Margulies, M Berg
IEEE Security & Privacy 14 (5), 93-95, 2016
32016
Securing Cloud-Based Applications, Part 1
J Margulies
IEEE Security & Privacy 13 (5), 96-98, 2015
12015
Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction]
S Peisert, J Margulies
IEEE Security & Privacy 12 (6), 13-14, 2014
12014
The Role of Attribution in Protecting PCS.
RL Hutchinson, J Margulies
Sandia National Laboratories Albuquerque, NM; Sandia National Laboratories …, 2011
2011
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–11