Professor Stephen D. Wolthusen

  1. 2010
  2. Published

    Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection

    Seeger, M., Baier, H., Busch, C. & Wolthusen, S. D., 26 May 2010, Proc. 2010 2nd International Workshop on Security and Communication Networks (IWSCN). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Agent-based host enumeration and vulnerability scanning using dynamic topology information

    Al-Salloum, Z. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2010 (ISSA). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    The cost of observation for intrusion detection: Performance impact of concurrent host observation

    Seeger, M., Busch, C., Baier, H. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2012 (ISSA). 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Forthcoming

    Enhanced Location Tracking for Tactical MANETs based on Particle Filters and Additional Information Sources

    Ebinger, P., Kuijper, A. & Wolthusen, S. D., Oct 2010, (Accepted/In press) Proc. 2012 Military Communications and Information Systems Conference. Piscataway, NJ, USA: IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Teeth Segmentation and Feature Extraction for Odontological Biometrics

    Mairaj, D., Busch, C. & Wolthusen, S. D., Oct 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE Computer Society Press, p. 323-328

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. 2011
  9. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles

    Al-Kuwari, S. & Wolthusen, S. D., 2011, Forensics in Telecommunications, Information, and Multimedia: Proceedings of the Third International ICST Conference (e-Forensics 2010). Springer-Verlag, p. 207-223

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework

    Wolthusen, S. D., 26 May 2011, Proc. 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011). IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Resource-constrained signal propagation modeling for tactical mobile ad hoc networks

    Reidt, S., Ebinger, P., Wolthusen, S. D. & Kuijper, A., 22 Jun 2011, Proceedings of the 2011 IEEE First International Workshop on Network Science (NSW 2011). IEEE Computer Society Press, p. 67-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Threat analysis model of an agent-based vulnerability mitigation mechanism using Bayesian Belief Networks

    Al-Salloum, Z. & Wolthusen, S. D., 22 Jun 2011, Proceedings of the 2011 First IEEE Network Science Workshop (NSW 2011). IEEE Computer Society Press, p. 144-151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    A propagation model of a vulnerability mitigation computer worm - SeaWave

    Al-Salloum, Z. & Wolthusen, S. D., 6 Sep 2011, Proceedings of the 2011 5th International Network and System Security Conference (NSS 2011). IEEE Computer Society Press, p. 347-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. 2012
  16. Forthcoming

    Agent Interaction and State Determination in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Forthcoming

    Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the 6th International Workshop on Critical Information Infrastructures Security 2011 (CRITIS 2011). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Forensic Tracking and Mobility Prediction in Vehicular Networks

    Al-Kuwari, S. & Wolthusen, S. D., 2012, Advances in Digital Forensics VIII: Proceedings of the Eighth IFIP WG 11.9 International Conference on Digital Forensics. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense

    Wolthusen, S. D. (ed.), Lopez, J. (ed.) & Setola, R. (ed.), 2 Mar 2012, Heidelberg, Germany: Springer-Verlag. 357 p.

    Research output: Book/ReportAnthology

  20. Published

    Algorithmic approach for clandestine localisation and tracking in short-range environments

    Al-Kuwari, S. & Wolthusen, S. D., Apr 2012, In: International Journal of Communication Networks and Distributed Systems. 9, 3/4, p. 311 327 p.

    Research output: Contribution to journalArticlepeer-review

  21. 2013
  22. Published

    An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

    Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013. Springer-Verlag, p. 321-335

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs

    Weldehawaryat, G. & Wolthusen, S. D., 2013, Proceedings of the 2013 IEEE 2nd International Workshop on Network Science (NSW 2013). IEEE Computer Society Press, p. 9-15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Forensic Entropy Analysis of Microsoft Windows Storage Volumes

    Weston, P. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Locating Subverted Processes using Random Packet Comparison in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2013, In: International Journal of Critical Infrastructures. 9, 1/2, p. 32-51

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Malicious False Data Injection in Hierarchical Electric Power Grid State Estimation Systems

    Feng, Y., Foglietta, C., Baiocco, A., Panzieri, S. & Wolthusen, S. D., 2013, Proceedings of the fourth international conference on Future energy systems (ACM e-Energy 2013). ACM Press, p. 183-192

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Forthcoming

    Multi-Round Attacks on Structural Controllability Properties for Non-Complete Random Graphs

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, (Accepted/In press) Proceedings of the 16th Information Security Conference (ISC 2013). Springer-Verlag, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Robust Coordination of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 2013 Third International Conference on Cloud and Green Computing (CGC). IEEE Computer Society Press, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution