Difference between revisions of "UNIK4750/List of papers - 2017"
(→List of papers for UNIK 4750) |
(→List of papers for UNIK 4750) |
||
(35 intermediate revisions by 2 users not shown) | |||
Line 3: | Line 3: | ||
<big> | <big> | ||
− | :1) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6006307&newsearch=true&queryText=internet%20of%20things%20security Gang, G, et al., "Internet of Things Security Analysis"] | + | :1) (Jeevan) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6006307&newsearch=true&queryText=internet%20of%20things%20security Gang, G, et al., "Internet of Things Security Analysis"] |
− | :2) [https://kasperskycontenthub.com/securelist/files/2016/07/KL_REPORT_ICS_Statistic_vulnerabilities.pdf Kapersky | + | :2) (Hans Jørgen) [https://kasperskycontenthub.com/securelist/files/2016/07/KL_REPORT_ICS_Statistic_vulnerabilities.pdf Kapersky Industrial Control Systems Vulnerabilities Statistics] |
− | Systems Vulnerabilities Statistics | + | |
+ | :4) (Oliver) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5751382&newsearch=true&queryText=internet%20of%20things%20security Ukil, A., Sen, J., and Koilakonda, S., "Embedded security for Internet of Things"] | ||
− | + | :5) (Amoordon) [http://journals.sagepub.com/doi/full/10.1155/2012/268478 HyungJun Kim, "Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks"] | |
− | : | + | |
− | + | ||
− | + | ||
− | + | ||
:6) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6774858&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Stankovic, J.A., "Research Directions for the Internet of Things"] | :6) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6774858&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Stankovic, J.A., "Research Directions for the Internet of Things"] | ||
Line 19: | Line 15: | ||
:7) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6142258&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"] | :7) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6142258&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"] | ||
+ | :8) [http://link.springer.com/article/10.1007/s11227-015-1547-0 Jeong Yeon, Yanghoon Kim, "Benefits of cloud computing adoption for smart grid security from security perspective"] | ||
+ | :9) [http://link.springer.com/chapter/10.1007/978-3-319-49148-6_6 Wenlin Han, Yang Xiao, "Big Data Security Analytic for Smart Grid with Fog Nodes"] | ||
− | :10) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7085953&filter%3DAND%28p_IS_Number%3A7085640%29 Lesk, M., "Safety Risks - Human Error or Mechanical Failure?: Lessons from Railways"] | + | :10) (Marius) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7085953&filter%3DAND%28p_IS_Number%3A7085640%29 Lesk, M., "Safety Risks - Human Error or Mechanical Failure?: Lessons from Railways"] |
+ | :11) [http://www.sciencedirect.com/science/article/pii/S1877705816318811 Yuntao Ye, , Lili Liang, Hongli Zhao, Yunzhong Jiang, "The System Architecture of Smart Water Grid for Water Security"] | ||
+ | :12) (Manish) [http://www.sciencedirect.com/science/article/pii/S1364032115014975 Yasin Kabalci, "A survey on smart metering and smart grid communication"] | ||
+ | :13) (Maghsoud) [https://www.researchgate.net/publication/304239302_Smart_grid_cyber_security_Challenges_and_solutions Salsabeel Shapsough et al.,"Smart grid cyber security: Challenges and solutions"] | ||
:14) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006441&filter%3DAND%28p_IS_Number%3A7006395%29 Barreto, C., Giraldo, J. ; Cardenas, A.A. ; Mojica-Nava, E., "Control Systems for the Power Grid and Their Resiliency to Attacks", Security & Privacy, IEEE (Volume:12 , Issue: 6 )] | :14) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006441&filter%3DAND%28p_IS_Number%3A7006395%29 Barreto, C., Giraldo, J. ; Cardenas, A.A. ; Mojica-Nava, E., "Control Systems for the Power Grid and Their Resiliency to Attacks", Security & Privacy, IEEE (Volume:12 , Issue: 6 )] | ||
Line 34: | Line 35: | ||
:17) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006412&filter%3DAND%28p_IS_Number%3A7006395%29 Kargl, F. ; Inst. of Distrib. Syst., Univ. of Ulm, Ulm, Germany ; van der Heijden, R.W. ; Konig, H. ; Valdes, A., "Insights on the Security and Dependability of Industrial Control Systems"] | :17) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006412&filter%3DAND%28p_IS_Number%3A7006395%29 Kargl, F. ; Inst. of Distrib. Syst., Univ. of Ulm, Ulm, Germany ; van der Heijden, R.W. ; Konig, H. ; Valdes, A., "Insights on the Security and Dependability of Industrial Control Systems"] | ||
− | :18) [http://onlinelibrary.wiley.com/doi/10.1002/sys.21252/abstract Zafar, N., Arnautovic, E., Diabat, A., and Davor Svetinovic, "System Security Requirements Analysis:A Smart Grid Case Study"] | + | (Alina) :18) [http://onlinelibrary.wiley.com/doi/10.1002/sys.21252/abstract Zafar, N., Arnautovic, E., Diabat, A., and Davor Svetinovic, "System Security Requirements Analysis:A Smart Grid Case Study"] |
+ | :19) [http://www.sciencedirect.com/science/article/pii/S1389128616301359 Mingkui Wei, Wenye Wang, "Data-centric threats and their impacts to real-time communications in smart grid"] | ||
:20) [https://library.e.abb.com/public/dc58deb3e38a4f42b398576160621a04/glendale-smart-grid-network.pdf Glendale Smart Grid Case study, ABB] | :20) [https://library.e.abb.com/public/dc58deb3e38a4f42b398576160621a04/glendale-smart-grid-network.pdf Glendale Smart Grid Case study, ABB] | ||
− | :21) [http://www.cisco.com/web/about/security/intelligence/iot_framework.html CISCO, "Securing the Internet of Things: A proposed framework"] | + | :21) (Kim Bjørneset) [http://www.cisco.com/web/about/security/intelligence/iot_framework.html CISCO, "Securing the Internet of Things: A proposed framework"] |
+ | |||
+ | :22) (Christian) [http://www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785 SANS Institute, "Securing the Internet of Things Survey"] | ||
+ | |||
+ | :23) (Elahe) [https://www.capgemini.com/resource-file-access/resource/pdf/securing_the_internet_of_things_opportunity_putting_cyber_security_at_the_heart_of_the_iot.pdf Gapgemini Consulting, "Securing the Internet of Things - Opportunity: Putting Cybersecurity at the Heart of the IoT"] | ||
+ | |||
+ | :24) [http://www.sciencedirect.com/science/article/pii/S0167404816300876 Langer, Lucie et al., "From old to new: Assessing cybersecurity risks for an evolving smart grid"] | ||
+ | |||
+ | :25) (Quihao) [https://www.researchgate.net/publication/293010814_Security_Assessment_of_Time_Synchronization_Mechanisms_for_The_Smart_Grid Bassam Moussa, "Security Assessment of Time Synchronization Mechanisms for The Smart Grid"] | ||
+ | |||
+ | :26) [http://ieeexplore.ieee.org/document/7565732/?reload=true Debiao He et al., "Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography"] | ||
+ | |||
+ | :27) [http://aircconline.com/ijnsa/V8N2/8216ijnsa06.pdf Elkhodr, Mahmoud ; Shahrestani, Seyed ; Cheung, Hon, "The Internet of Things : New Interoperability, Management and Security Challenges"] | ||
+ | |||
+ | :28) (Marius)[https://www.researchgate.net/publication/311447699_Think_Like_a_Hacker_Insights_on_the_Latest_Attack_Vectors_and_Security_Controls_for_Medical_Device_Applications Mandeep Khera, "Think Like a Hacker: Insights on the Latest Attack Vectors (and Security Controls) for Medical Device Applications"] | ||
+ | |||
+ | :29) [http://ieeexplore.ieee.org/document/7562568/ Mohsen Nia, A., Jha, N.K., "A Comprehensive Study of Security of Internet-of-Things"] | ||
+ | |||
+ | :30) [https://thesai.org/Downloads/Volume7No12/Paper_54-Software_Defined_Security_Service_Provisioning.pdf Idris, Faraz, Hameed, Sufian, "Software Defined Security Service Provisioning Framework for Internet of Things"] | ||
+ | |||
+ | :31) (Aviral) [http://ubiquity.acm.org/article.cfm?id=2822881 Venkatakrishnan, Roopak, Vouk, Mladen, "Using Redundancy to Detect Security Anomalies: Towards IoT security attack detectors: The Internet of Things (Ubiquity symposium)"] | ||
+ | |||
+ | :32) [http://www.sciencedirect.com/science/article/pii/S0267364916301169 Weber, Rolf H., Studer, Evelyne, "Cybersecurity in the Internet of Things: Legal aspects"] | ||
+ | |||
+ | :33) [http://ieeexplore.ieee.org/document/7478513/ Ali, Mazhar et al., "Security and Dependability of Cloud-Assisted Internet of Things"] | ||
+ | |||
+ | :34) [http://www.sciencedirect.com/science/article/pii/S1389128616302663 Sicari, Sabrina et al., "Security policy enforcement for networked smart objects"] | ||
+ | |||
+ | :35) (Syeda) [http://www.sciencedirect.com/science/article/pii/S0167739X15002812 Andreas Jacobsson et al., "A risk analysis of a smart home automation system"] | ||
+ | |||
+ | +1 (Ole Christian) "IoT Security and Privacy Recommendations" by BITAG, | ||
+ | |||
+ | +1 (Khagen) Kai Zhao, LinaGe, "A Survey on the Internet of Things Security" | ||
+ | |||
+ | +1 (Ashish) A. A. Khan, M. H. Rehmani and A. Rachedi, "When Cognitive Radio meets the Internet of Things?," 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, 2016, pp. 469-474. | ||
− | + | +1 (Desta) "Threat Analysis of IoT Networks Using Artificial Neural Network Intrusion Detection System" | |
− | + | +1 (Itendra) "Wireless Sensor Networks and the Internet of Things: Selected Challenges" by Delphine Christin, Andreas Reinhardt, Parag S. Mogre and Ralf Steinmetz | |
+ | +1 (Shukun) Garcia-Morchon, Oscar, et al. "Security considerations in the IP-based Internet of Things." (2017) | ||
+ | +1 (Zyyad) Measurable Security, Privacy and Dependability in Smart Grids by Josef Noll, Iñaki Garitano, Seraj Fayyad, Erik Åsberg and Habtamu Abie | ||
Latest revision as of 20:00, 8 March 2017
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
List of papers for UNIK 4750
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on: Guide on how to search for Literature
- 2) (Hans Jørgen) Kapersky Industrial Control Systems Vulnerabilities Statistics
- 5) (Amoordon) HyungJun Kim, "Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks"
- 21) (Kim Bjørneset) CISCO, "Securing the Internet of Things: A proposed framework"
- 22) (Christian) SANS Institute, "Securing the Internet of Things Survey"
- 24) Langer, Lucie et al., "From old to new: Assessing cybersecurity risks for an evolving smart grid"
- 25) (Quihao) Bassam Moussa, "Security Assessment of Time Synchronization Mechanisms for The Smart Grid"
+1 (Ole Christian) "IoT Security and Privacy Recommendations" by BITAG,
+1 (Khagen) Kai Zhao, LinaGe, "A Survey on the Internet of Things Security"
+1 (Ashish) A. A. Khan, M. H. Rehmani and A. Rachedi, "When Cognitive Radio meets the Internet of Things?," 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, 2016, pp. 469-474.
+1 (Desta) "Threat Analysis of IoT Networks Using Artificial Neural Network Intrusion Detection System"
+1 (Itendra) "Wireless Sensor Networks and the Internet of Things: Selected Challenges" by Delphine Christin, Andreas Reinhardt, Parag S. Mogre and Ralf Steinmetz
+1 (Shukun) Garcia-Morchon, Oscar, et al. "Security considerations in the IP-based Internet of Things." (2017)
+1 (Zyyad) Measurable Security, Privacy and Dependability in Smart Grids by Josef Noll, Iñaki Garitano, Seraj Fayyad, Erik Åsberg and Habtamu Abie
Evaluation criteria
Your presentation is expected to last for 15 minutes, you will be stopped at 15:30 (we have many students this year and have to keep the schedule). That means you need to identify the key messages of the selected paper.
Your presentation will be evaluated with respect to the following criteria:
Knowledge and Overview over topics in the paper
- what is the paper about, which specific aspects are addressed?
Identification of key findings of the paper:
- why are the findings key findings, to what extend are they different from the state-of-knowledge?
- what are the strengths/weaknesses of the approaches being mentioned
Scientifically precise presentation
- Be precise in your formulations, avoid story telling.
- Use numbers where appropriate, e.g. 20% more
Evaluation of the paper
- what is your take on the paper? Criticism, own thoughts,...
Style:
- clear structure, clear and concise slides
- Provide examples, and respect the time