Smart-grid security issues H Khurana, M Hadley, N Lu, DA Frincke IEEE Security & Privacy 8 (1), 81-85, 2010 | 841 | 2010 |
Detecting false data injection attacks on dc state estimation RB Bobba, KM Rogers, Q Wang, H Khurana, K Nahrstedt, TJ Overbye Preprints of the first workshop on secure control systems, CPSWEEK 2010, 2010 | 582 | 2010 |
System and method for insider threat detection H Khurana, V Guralnik, R Shanley US Patent 8,793,790, 2014 | 359 | 2014 |
Intrusion detection for advanced metering infrastructures: Requirements and architectural directions R Berthier, WH Sanders, H Khurana 2010 First IEEE international conference on smart grid communications, 350-355, 2010 | 322 | 2010 |
RRE: A game-theoretic intrusion response and recovery engine SA Zonouz, H Khurana, WH Sanders, TM Yardley IEEE Transactions on Parallel and Distributed Systems 25 (2), 395-406, 2013 | 320 | 2013 |
An authenticated control framework for distributed voltage support on the smart grid KM Rogers, R Klump, H Khurana, AA Aquino-Lugo, TJ Overbye IEEE transactions on smart grid 1 (1), 40-47, 2010 | 260 | 2010 |
Attribute-sets: A practically motivated enhancement to attribute-based encryption R Bobba, H Khurana, M Prabhakaran Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 234 | 2009 |
Time valid one-time signature for time-critical multicast data authentication Q Wang, H Khurana, Y Huang, K Nahrstedt IEEE INFOCOM 2009, 1233-1241, 2009 | 118 | 2009 |
Design principles for power grid cyber-infrastructure authentication protocols H Khurana, R Bobba, T Yardley, P Agarwal, E Heine 2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010 | 102 | 2010 |
Towards a taxonomy of attacks against energy control systems T Fleury, H Khurana, V Welch Critical Infrastructure Protection II 2, 71-85, 2008 | 91 | 2008 |
Scalable security and accounting services for content-based publish/subscribe systems H Khurana Proceedings of the 2005 ACM symposium on Applied computing, 801-807, 2005 | 79 | 2005 |
MIS: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming Q Wang, L Vu, K Nahrstedt, H Khurana 2010 Proceedings IEEE INFOCOM, 1-5, 2010 | 77 | 2010 |
Enhancing grid measurements: Wide area measurement systems, NASPInet, and security RB Bobba, J Dagle, E Heine, H Khurana, WH Sanders, P Sauer, ... IEEE Power and Energy Magazine 10 (1), 67-73, 2011 | 75 | 2011 |
Using attribute-based access control to enable attribute-based messaging R Bobba, O Fatemieh, F Khan, CA Gunter, H Khurana 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 403-413, 2006 | 73 | 2006 |
Lossless compression of synchronized phasor measurements R Klump, P Agarwal, JE Tate, H Khurana IEEE PES general meeting, 1-7, 2010 | 72 | 2010 |
PBES: a policy based encryption system with application to data sharing in the power grid R Bobba, H Khurana, M AlTurki, F Ashraf Proceedings of the 4th international symposium on information, computer, and …, 2009 | 67 | 2009 |
Staying in control: Cybersecurity and the modern electric grid J Hull, H Khurana, T Markham, K Staggs IEEE Power and Energy Magazine 10 (1), 41-48, 2011 | 58 | 2011 |
Palantir: a framework for collaborative incident response and investigation H Khurana, J Basney, M Bakht, M Freemon, V Welch, R Butler Proceedings of the 8th Symposium on Identity and Trust on the Internet, 38-51, 2009 | 57 | 2009 |
Attribute-based messaging: Access control and confidentiality R Bobba, O Fatemieh, F Khan, A Khan, CA Gunter, H Khurana, ... ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010 | 53 | 2010 |
Image recognition for personal protective equipment compliance enforcement in work areas KW Au, P Davalos, S Venkatesha, H Khurana, SJ Bedros, MI Mohideen, ... US Patent 9,695,981, 2017 | 52 | 2017 |