Professor Stephen D. Wolthusen

  1. 2012
  2. Published

    Forensic Tracking and Mobility Prediction in Vehicular Networks

    Al-Kuwari, S. & Wolthusen, S. D., 2012, Advances in Digital Forensics VIII: Proceedings of the Eighth IFIP WG 11.9 International Conference on Digital Forensics. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2011
  4. Published

    A propagation model of a vulnerability mitigation computer worm - SeaWave

    Al-Salloum, Z. & Wolthusen, S. D., 6 Sep 2011, Proceedings of the 2011 5th International Network and System Security Conference (NSS 2011). IEEE Computer Society Press, p. 347-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Resource-constrained signal propagation modeling for tactical mobile ad hoc networks

    Reidt, S., Ebinger, P., Wolthusen, S. D. & Kuijper, A., 22 Jun 2011, Proceedings of the 2011 IEEE First International Workshop on Network Science (NSW 2011). IEEE Computer Society Press, p. 67-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Threat analysis model of an agent-based vulnerability mitigation mechanism using Bayesian Belief Networks

    Al-Salloum, Z. & Wolthusen, S. D., 22 Jun 2011, Proceedings of the 2011 First IEEE Network Science Workshop (NSW 2011). IEEE Computer Society Press, p. 144-151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework

    Wolthusen, S. D., 26 May 2011, Proc. 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011). IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles

    Al-Kuwari, S. & Wolthusen, S. D., 2011, Forensics in Telecommunications, Information, and Multimedia: Proceedings of the Third International ICST Conference (e-Forensics 2010). Springer-Verlag, p. 207-223

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. 2010
  11. Forthcoming

    Enhanced Location Tracking for Tactical MANETs based on Particle Filters and Additional Information Sources

    Ebinger, P., Kuijper, A. & Wolthusen, S. D., Oct 2010, (Accepted/In press) Proc. 2012 Military Communications and Information Systems Conference. Piscataway, NJ, USA: IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Teeth Segmentation and Feature Extraction for Odontological Biometrics

    Mairaj, D., Busch, C. & Wolthusen, S. D., Oct 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE Computer Society Press, p. 323-328

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Agent-based host enumeration and vulnerability scanning using dynamic topology information

    Al-Salloum, Z. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2010 (ISSA). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    The cost of observation for intrusion detection: Performance impact of concurrent host observation

    Seeger, M., Busch, C., Baier, H. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2012 (ISSA). 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection

    Seeger, M., Baier, H., Busch, C. & Wolthusen, S. D., 26 May 2010, Proc. 2010 2nd International Workshop on Security and Communication Networks (IWSCN). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks

    Wolthusen, S. D. & Al-Kuwari, S., May 2010, Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference (MobiSec 2010). Springer-Verlag, p. 67-79

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems

    Mcevoy, R. & Wolthusen, S. D., May 2010, Proceedings of the 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 125-133

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Host-Based Security Sensor Integrity in Multiprocessing Environments

    Mcevoy, R. & Wolthusen, S. D., May 2010, Information Security, Practice and Experience: 6th International Conference, ISPEC 2010. Springer-Verlag, p. 138-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Observation Mechanism and Cost Model for Tightly Coupled Asymmetric Concurrency

    Seeger, M. & Wolthusen, S. D., May 2010, Proceedings, 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 158-163

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion

    Al-Kuwari, S. & Wolthusen, S. D., May 2010, Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference (CMS 2010). Springer-Verlag, p. 16-27

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes

    Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 81-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments

    Lunden, N., Sveen, R., Lund, H., Svendsen, N. & Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 171-183

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism

    Al-Salloum, Z. & Wolthusen, S. D., 15 Feb 2010, ARES '10 International Conference on Availability, Reliability, and Security. IEEE Computer Society Press, p. 549-554

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. 2009
  27. Published

    Efficient state estimation and Byzantine behavior identification in Tactical MANETs

    Ebinger, P. & Wolthusen, S. D., 18 Oct 2009, Proc. 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Energy-efficient key distribution and revocation in tactical networks with asymmetric links

    Reidt, S. & Wolthusen, S. D., 18 Oct 2009, 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution