dr0wned–{Cyber-Physical} attack with additive manufacturing S Belikovetsky, M Yampolskiy, J Toh, J Gatlin, Y Elovici 11th USENIX workshop on offensive technologies (WOOT 17), 2017 | 169 | 2017 |
Security of additive manufacturing: Attack taxonomy and survey M Yampolskiy, WE King, J Gatlin, S Belikovetsky, A Brown, A Skjellum, ... Additive Manufacturing 21, 431-457, 2018 | 168 | 2018 |
Taxonomy for description of cross-domain attacks on CPS M Yampolskiy, P Horvath, XD Koutsoukos, Y Xue, J Sztipanovits Proceedings of the 2nd ACM international conference on High confidence …, 2013 | 152 | 2013 |
Using 3D printers as weapons M Yampolskiy, A Skjellum, M Kretzschmar, RA Overfelt, KR Sloan, ... International Journal of Critical Infrastructure Protection 14, 58-71, 2016 | 122 | 2016 |
In-vehicle networks: Attacks, vulnerabilities, and proposed solutions P Carsten, TR Andel, M Yampolskiy, JT McDonald Proceedings of the 10th Annual Cyber and Information Security Research …, 2015 | 115 | 2015 |
Digital audio signature for 3D printing integrity S Belikovetsky, YA Solewicz, M Yampolskiy, J Toh, Y Elovici ieee transactions on information forensics and security 14 (5), 1127-1141, 2018 | 105* | 2018 |
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014 | 100 | 2014 |
A language for describing attacks on cyber-physical systems M Yampolskiy, P Horváth, XD Koutsoukos, Y Xue, J Sztipanovits International Journal of Critical Infrastructure Protection 8, 40-52, 2015 | 86 | 2015 |
Implications of malicious 3D printer firmware SB Moore, WB Glisson, M Yampolskiy Proceedings of the 50th Hawaii International Conference on System Sciences, 2017 | 81 | 2017 |
Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach M Yampolskiy, P Horvath, XD Koutsoukos, Y Xue, J Sztipanovits 2012 5th International Symposium on Resilient Control Systems, 55-62, 2012 | 73 | 2012 |
Detecting sabotage attacks in additive manufacturing using actuator power signatures J Gatlin, S Belikovetsky, SB Moore, Y Solewicz, Y Elovici, M Yampolskiy IEEE Access 7, 133421-133432, 2019 | 70* | 2019 |
Security challenges of additive manufacturing with metals and alloys M Yampolskiy, L Schutzle, U Vaidya, A Yasinsac Critical Infrastructure Protection IX: 9th IFIP 11.10 International …, 2015 | 67 | 2015 |
Vulnerability analysis of desktop 3D printer software S Moore, P Armstrong, T McDonald, M Yampolskiy 2016 Resilience Week (RWS), 46-51, 2016 | 52 | 2016 |
How to ensure bad quality in metal additive manufacturing: In-situ infrared thermography from the security perspective A Slaughter, M Yampolskiy, M Matthews, WE King, G Guss, Y Elovici Proceedings of the 12th International Conference on Availability …, 2017 | 51 | 2017 |
Characteristic aspects of additive manufacturing security from security awareness perspectives LMG Graves, J Lubell, W King, M Yampolskiy IEEE Access 7, 103833-103853, 2019 | 40 | 2019 |
Evaluation of additive and subtractive manufacturing from the security perspective M Yampolskiy, W King, G Pope, S Belikovetsky, Y Elovici Critical Infrastructure Protection XI: 11th IFIP WG 11.10 International …, 2017 | 33 | 2017 |
Legal aspects of protecting intellectual property in additive manufacturing A Brown, M Yampolskiy, J Gatlin, T Andel Critical Infrastructure Protection X: 10th IFIP WG 11.10 International …, 2016 | 30 | 2016 |
A hazard analysis technique for additive manufacturing G Pope, M Yampolskiy arXiv preprint arXiv:1706.00497, 2017 | 29 | 2017 |
Management of multidomain end-to-end links-a federated approach for the pan-european research network geant 2 M Yampolskiy, MK Hamm 2007 10th IFIP/IEEE International Symposium on Integrated Network Management …, 2007 | 27 | 2007 |
Phase space detection of virtual machine cyber events through hypervisor-level system call analysis JA Dawson, JT McDonald, L Hively, TR Andel, M Yampolskiy, C Hubbard 2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018 | 23 | 2018 |