CloudID: Trustworthy cloud-based and cross-enterprise biometric identification M Haghighat, S Zonouz, M Abdel-Mottaleb Expert Systems with Applications 42 (21), 7905-7916, 2015 | 411 | 2015 |
A multi-sensor energy theft detection framework for advanced metering infrastructures S McLaughlin, B Holbert, A Fawaz, R Berthier, S Zonouz IEEE journal on selected areas in communications 31 (7), 1319-1330, 2013 | 324 | 2013 |
RRE: A game-theoretic intrusion response and recovery engine SA Zonouz, H Khurana, WH Sanders, TM Yardley IEEE Transactions on Parallel and Distributed Systems 25 (2), 395-406, 2013 | 308 | 2013 |
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. L Garcia, F Brasser, MH Cintuglu, AR Sadeghi, OA Mohammed, ... NDSS, 1-15, 2017 | 223 | 2017 |
SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures S Zonouz, KM Rogers, R Berthier, RB Bobba, WH Sanders, TJ Overbye IEEE Transactions on Smart Grid 3 (4), 1790-1799, 2012 | 212 | 2012 |
Identification using encrypted biometrics M Haghighat, S Zonouz, M Abdel-Mottaleb Computer Analysis of Images and Patterns: 15th International Conference …, 2013 | 198 | 2013 |
CPIndex: Cyber-physical vulnerability assessment for power-grid infrastructures C Vellaithurai, A Srivastava, S Zonouz, R Berthier IEEE Transactions on Smart Grid 6 (2), 566-575, 2014 | 183 | 2014 |
A cyber-physical modeling and assessment framework for power grid infrastructures KR Davis, CM Davis, SA Zonouz, RB Bobba, R Berthier, L Garcia, ... IEEE Transactions on smart grid 6 (5), 2464-2475, 2015 | 160 | 2015 |
A Trusted Safety Verifier for Process Controller Code. SE McLaughlin, SA Zonouz, DJ Pohly, PD McDaniel NDSS 14, 2014 | 149 | 2014 |
A cloud-based intrusion detection and response system for mobile phones A Houmansadr, SA Zonouz, R Berthier 2011 IEEE/IFIP 41st International Conference on Dependable Systems and …, 2011 | 141 | 2011 |
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones S Zonouz, A Houmansadr, R Berthier, N Borisov, W Sanders Computers & Security 37, 215-227, 2013 | 136 | 2013 |
SOCCA: A security-oriented cyber-physical contingency analysis in power infrastructures S Zonouz, CM Davis, KR Davis, R Berthier, RB Bobba, WH Sanders IEEE Transactions on Smart Grid 5 (1), 3-13, 2013 | 126 | 2013 |
Watch me, but don't touch me! contactless control flow monitoring via electromagnetic emanations Y Han, S Etigowni, H Liu, S Zonouz, A Petropulu Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 124 | 2017 |
Chip: Channel independence-based pruning for compact neural networks Y Sui, M Yin, Y Xie, H Phan, S Aliari Zonouz, B Yuan Advances in Neural Information Processing Systems 34, 24604-24616, 2021 | 112 | 2021 |
Cyber-physical resilience: Definition and assessment metric A Clark, S Zonouz IEEE Transactions on Smart Grid 10 (2), 1671-1684, 2017 | 102 | 2017 |
Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed P Wlazlo, A Sahu, Z Mao, H Huang, A Goulart, K Davis, S Zonouz IET Cyber‐Physical Systems: Theory & Applications 6 (3), 164-177, 2021 | 90 | 2021 |
Detecting industrial control malware using automated PLC code analytics S Zonouz, J Rrushi, S McLaughlin IEEE Security & Privacy 12 (6), 40-47, 2014 | 88 | 2014 |
Multi-source multi-domain data fusion for cyberattack detection in power systems A Sahu, Z Mao, P Wlazlo, H Huang, K Davis, A Goulart, S Zonouz IEEE Access 9, 119118-119138, 2021 | 66 | 2021 |
AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures S McLaughlin, B Holbert, S Zonouz, R Berthier 2012 IEEE Third International Conference on Smart Grid Communications …, 2012 | 66 | 2012 |
See no evil, hear no evil, feel no evil, print no evil? malicious fill patterns detection in additive manufacturing C Bayens, T Le, L Garcia, R Beyah, M Javanmard, S Zonouz 26th USENIX Security Symposium (USENIX Security 17), 1181-1198, 2017 | 64 | 2017 |