Professor Stephen D. Wolthusen

  1. Published

    Efficient control recovery for resilient control systems

    Zhang, S. & Wolthusen, S., 21 May 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  2. Published

    Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures

    Wolthusen, S., 2016, Proceedings of the Second International Conference on Future Network Systems and Security. Springer-Verlag, p. 47-61 15 p. (Communications in Computer and Information Science; vol. 670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Efficient state estimation and Byzantine behavior identification in Tactical MANETs

    Ebinger, P. & Wolthusen, S. D., 18 Oct 2009, Proc. 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Energy-efficient key distribution and revocation in tactical networks with asymmetric links

    Reidt, S. & Wolthusen, S. D., 18 Oct 2009, 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Forthcoming

    Enhanced Location Tracking for Tactical MANETs based on Particle Filters and Additional Information Sources

    Ebinger, P., Kuijper, A. & Wolthusen, S. D., Oct 2010, (Accepted/In press) Proc. 2012 Military Communications and Information Systems Conference. Piscataway, NJ, USA: IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. E-pub ahead of print

    Error Propagation after Reordering Attacks on Hierarchical State Estimation

    Gul, A. & Wolthusen, S., 18 Dec 2018, (E-pub ahead of print) Proceedings of the Twelfth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Staggs, J. & Shenoi, S. (eds.). Springer-Verlag, p. 67-79 13 p. (IFIP Advances in Information and Communication Technology; vol. 542).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 1 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). SciTePress, p. 448-456 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Feature Correlation Attack on Biometric Privacy Protection Schemes

    Zhou, X., Busch, C., Kuijper, A. & Wolthusen, S. D., 12 Sep 2009, Proc. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009). IEEE Computer Society Press, p. 1061-1065

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Forensic Entropy Analysis of Microsoft Windows Storage Volumes

    Weston, P. & Wolthusen, S. D., 2014, In: SAIEE Africa Research Journal. 105, 2, p. 21 28 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Forensic Entropy Analysis of Microsoft Windows Storage Volumes

    Weston, P. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...12 Next