Follow
Himanshu Khurana
Himanshu Khurana
Honeywell International Inc
Verified email at Honeywell.com
Title
Cited by
Cited by
Year
Smart-grid security issues
H Khurana, M Hadley, N Lu, DA Frincke
IEEE Security & Privacy 8 (1), 81-85, 2010
8412010
Detecting false data injection attacks on dc state estimation
RB Bobba, KM Rogers, Q Wang, H Khurana, K Nahrstedt, TJ Overbye
Preprints of the first workshop on secure control systems, CPSWEEK 2010, 2010
5822010
System and method for insider threat detection
H Khurana, V Guralnik, R Shanley
US Patent 8,793,790, 2014
3592014
Intrusion detection for advanced metering infrastructures: Requirements and architectural directions
R Berthier, WH Sanders, H Khurana
2010 First IEEE international conference on smart grid communications, 350-355, 2010
3222010
RRE: A game-theoretic intrusion response and recovery engine
SA Zonouz, H Khurana, WH Sanders, TM Yardley
IEEE Transactions on Parallel and Distributed Systems 25 (2), 395-406, 2013
3202013
An authenticated control framework for distributed voltage support on the smart grid
KM Rogers, R Klump, H Khurana, AA Aquino-Lugo, TJ Overbye
IEEE transactions on smart grid 1 (1), 40-47, 2010
2602010
Attribute-sets: A practically motivated enhancement to attribute-based encryption
R Bobba, H Khurana, M Prabhakaran
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
2342009
Time valid one-time signature for time-critical multicast data authentication
Q Wang, H Khurana, Y Huang, K Nahrstedt
IEEE INFOCOM 2009, 1233-1241, 2009
1182009
Design principles for power grid cyber-infrastructure authentication protocols
H Khurana, R Bobba, T Yardley, P Agarwal, E Heine
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
1022010
Towards a taxonomy of attacks against energy control systems
T Fleury, H Khurana, V Welch
Critical Infrastructure Protection II 2, 71-85, 2008
912008
Scalable security and accounting services for content-based publish/subscribe systems
H Khurana
Proceedings of the 2005 ACM symposium on Applied computing, 801-807, 2005
792005
MIS: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming
Q Wang, L Vu, K Nahrstedt, H Khurana
2010 Proceedings IEEE INFOCOM, 1-5, 2010
772010
Enhancing grid measurements: Wide area measurement systems, NASPInet, and security
RB Bobba, J Dagle, E Heine, H Khurana, WH Sanders, P Sauer, ...
IEEE Power and Energy Magazine 10 (1), 67-73, 2011
752011
Using attribute-based access control to enable attribute-based messaging
R Bobba, O Fatemieh, F Khan, CA Gunter, H Khurana
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 403-413, 2006
732006
Lossless compression of synchronized phasor measurements
R Klump, P Agarwal, JE Tate, H Khurana
IEEE PES general meeting, 1-7, 2010
722010
PBES: a policy based encryption system with application to data sharing in the power grid
R Bobba, H Khurana, M AlTurki, F Ashraf
Proceedings of the 4th international symposium on information, computer, and …, 2009
672009
Staying in control: Cybersecurity and the modern electric grid
J Hull, H Khurana, T Markham, K Staggs
IEEE Power and Energy Magazine 10 (1), 41-48, 2011
582011
Palantir: a framework for collaborative incident response and investigation
H Khurana, J Basney, M Bakht, M Freemon, V Welch, R Butler
Proceedings of the 8th Symposium on Identity and Trust on the Internet, 38-51, 2009
572009
Attribute-based messaging: Access control and confidentiality
R Bobba, O Fatemieh, F Khan, A Khan, CA Gunter, H Khurana, ...
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
532010
Image recognition for personal protective equipment compliance enforcement in work areas
KW Au, P Davalos, S Venkatesha, H Khurana, SJ Bedros, MI Mohideen, ...
US Patent 9,695,981, 2017
522017
The system can't perform the operation now. Try again later.
Articles 1–20