default search action
Robin Berthier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j11]Ahmed M. Fawaz, Robin Berthier, William H. Sanders:
A Response Cost Model for Advanced Metering Infrastructures. IEEE Trans. Smart Grid 7(2): 543-553 (2016) - [c25]Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit, Tim Yardley, Robin Berthier, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey:
An Internet-wide view of ICS devices. PST 2016: 96-103 - [c24]Gabriel A. Weaver, Kate Davis, Charles M. Davis, Edmond J. Rogers, Rakesh B. Bobba, Saman A. Zonouz, Robin Berthier, Peter W. Sauer, David M. Nicol:
Cyber-Physical models for power grid security analysis: 8-substation case. SmartGridComm 2016: 140-146 - 2015
- [j10]Saman A. Zonouz, Robin Berthier, Himanshu Khurana, William H. Sanders, Tim Yardley:
Seclius: An Information Flow-Based, Consequence-Centric Security Metric. IEEE Trans. Parallel Distributed Syst. 26(2): 562-573 (2015) - [j9]Ceeman Vellaithurai, Anurag Srivastava, Saman A. Zonouz, Robin Berthier:
CPIndex: Cyber-Physical Vulnerability Assessment for Power-Grid Infrastructures. IEEE Trans. Smart Grid 6(2): 566-575 (2015) - [j8]Katherine R. Davis, Charles M. Davis, Saman A. Zonouz, Rakesh B. Bobba, Robin Berthier, Luis Garcia, Peter W. Sauer:
A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures. IEEE Trans. Smart Grid 6(5): 2464-2475 (2015) - [c23]Henry Senyondo, Pengfei Sun, Robin Berthier, Saman A. Zonouz:
PLCloud: Comprehensive power grid PLC security monitoring with zero safety disruption. SmartGridComm 2015: 809-816 - 2014
- [j7]Saman A. Zonouz, Charles M. Davis, Katherine R. Davis, Robin Berthier, Rakesh B. Bobba, William H. Sanders:
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures. IEEE Trans. Smart Grid 5(1): 3-13 (2014) - [j6]Alvaro A. Cárdenas, Robin Berthier, Rakesh B. Bobba, Jun Ho Huh, Jorjeta G. Jetcheva, David Grochocki, William H. Sanders:
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures. IEEE Trans. Smart Grid 5(2): 906-915 (2014) - [c22]André Teixeira, György Dán, Henrik Sandberg, Robin Berthier, Rakesh B. Bobba, Alfonso Valdes:
Security of smart distribution grids: Data integrity attacks on integrated volt/VAR control and countermeasures. ACC 2014: 4372-4378 - [c21]Robin Berthier, David I. Urbina, Alvaro A. Cárdenas, Michael Guerrero, Ulrich Herberg, Jorjeta G. Jetcheva, Daisuke Mashima, Jun Ho Huh, Rakesh B. Bobba:
On the practicality of detecting anomalies with encrypted traffic in AMI. SmartGridComm 2014: 890-895 - [c20]Tawfeeq A. Shawly, Jun Liu, Nathan Burow, Saurabh Bagchi, Robin Berthier, Rakesh B. Bobba:
A risk assessment tool for advanced metering infrastructures. SmartGridComm 2014: 989-994 - 2013
- [j5]Saman A. Zonouz, Amir Houmansadr, Robin Berthier, Nikita Borisov, William H. Sanders:
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Comput. Secur. 37: 215-227 (2013) - [j4]Stephen E. McLaughlin, Brett Holbert, Ahmed M. Fawaz, Robin Berthier, Saman A. Zonouz:
A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures. IEEE J. Sel. Areas Commun. 31(7): 1319-1330 (2013) - [c19]Timothy M. Yardley, Robin Berthier, David M. Nicol, William H. Sanders:
Smart grid protocol testing through cyber-physical testbeds. ISGT 2013: 1-6 - [c18]Robin Berthier, Jorjeta G. Jetcheva, Daisuke Mashima, Jun Ho Huh, David Grochocki, Rakesh B. Bobba, Alvaro A. Cárdenas, William H. Sanders:
Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures. SmartGridComm 2013: 450-455 - [c17]Muhammad Salman Malik, Robin Berthier, Rakesh B. Bobba, Roy H. Campbell, William H. Sanders:
Formal design of communication checkers for ICCP using UPPAAL. SmartGridComm 2013: 486-491 - 2012
- [j3]Saman A. Zonouz, Katherine M. Rogers, Robin Berthier, Rakeshbabu Bobba, William H. Sanders, Thomas J. Overbye:
SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures. IEEE Trans. Smart Grid 3(4): 1790-1799 (2012) - [c16]Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Safeguarding academic accounts and resources with the University Credential Abuse Auditing System. DSN 2012: 1-8 - [c15]Saman A. Zonouz, Robin Berthier, Negin Arhami:
Towards incorporating human intelligence into online security solutions. DSN Workshops 2012: 1-2 - [c14]Saman A. Zonouz, Robin Berthier, Parisa Haghani:
A Fuzzy Markov Model for scalable reliability analysis of Advanced Metering Infrastructure. ISGT 2012: 1-5 - [c13]Ahmed M. Fawaz, Robin Berthier, William H. Sanders:
Cost modeling of response actions for automated response and recovery in AMI. SmartGridComm 2012: 348-353 - [c12]Stephen E. McLaughlin, Brett Holbert, Saman A. Zonouz, Robin Berthier:
AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures. SmartGridComm 2012: 354-359 - [c11]David Grochocki, Jun Ho Huh, Robin Berthier, Rakesh Bobba, William H. Sanders, Alvaro A. Cárdenas, Jorjeta G. Jetcheva:
AMI threats, intrusion detection requirements and deployment recommendations. SmartGridComm 2012: 395-400 - [c10]Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Learning from Early Attempts to Measure Information Security Performance. CSET 2012 - 2011
- [c9]Amir Houmansadr, Saman A. Zonouz, Robin Berthier:
A cloud-based intrusion detection and response system for mobile phones. DSN Workshops 2011: 31-32 - [c8]Bertrand Sobesto, Michel Cukier, Matti A. Hiltunen, Dave Kormann, Gregg Vesonder, Robin Berthier:
DarkNOC: Dashboard for Honeypot Management. LISA 2011 - [c7]Gabriel Salles-Loustau, Robin Berthier, Etienne Collange, Bertrand Sobesto, Michel Cukier:
Characterizing Attackers and Attacks: An Empirical Study. PRDC 2011: 174-183 - [c6]Robin Berthier, William H. Sanders:
Specification-Based Intrusion Detection for Advanced Metering Infrastructures. PRDC 2011: 184-193
2000 – 2009
- 2009
- [j2]Robin Berthier, Michel Cukier:
An evaluation of connection characteristics for separating network attacks. Int. J. Secur. Networks 4(1/2): 110-124 (2009) - [c5]Robin Berthier, Jorge Arjona, Michel Cukier:
Analyzing the process of installing rogue software. DSN 2009: 560-565 - 2008
- [j1]Huyen Tue Dao, Adam L. Bazinet, Robin Berthier, Ben Shneiderman:
NASDAQ Velocity and Forces: An Interactive Visualization of Activity and Change. J. Univers. Comput. Sci. 14(9): 1391-1410 (2008) - [c4]Robin Berthier, Dave Kormann, Michel Cukier, Matti A. Hiltunen, Gregg Vesonder, Daniel Sheleheda:
On the Comparison of Network Attack Datasets: An Empirical Analysis. HASE 2008: 39-48 - [c3]Robin Berthier, Michel Cukier:
The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. HASE 2008: 59-68 - 2007
- [c2]Daniel Ramsbrock, Robin Berthier, Michel Cukier:
Profiling Attacker Behavior Following SSH Compromises. DSN 2007: 119-124 - 2006
- [c1]Michel Cukier, Robin Berthier, Susmit Panjwani, Stephanie Tan:
A Statistical Analysis of Attack Data to Separate Attacks. DSN 2006: 383-392
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint