default search action
Thomas H. Morris
Person information
- affiliation: University of Alabama in Huntsville, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Jared Sheldon, Scott Ross, Thomas H. Morris, Isabelle Brown, Feng Zhu, Patrick Pape, Phillip Whitlow:
Genomics Cybersecurity Concerns, Challenges, and a Modular Test Lab. ACM Southeast Regional Conference 2024: 86-94 - 2023
- [j18]Steven Puckett, Jianqing Liu, Seong-Moo Yoo, Thomas H. Morris:
A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators. IEEE Internet Things J. 10(24): 22143-22152 (2023) - 2022
- [e4]Kim-Kwang Raymond Choo, Tommy H. Morris, Gilbert L. Peterson, Eric S. Imsand:
National Cyber Summit (NCS) Research Track 2021, Huntsville, AL, USA, September 28-30, 2021. Lecture Notes in Networks and Systems 310, Springer 2022, ISBN 978-3-030-84613-8 [contents] - 2021
- [c30]Mohammad E. Alim, Shelton R. Wright, Tommy H. Morris:
A Laboratory-Scale Canal SCADA System Testbed for Cybersecurity Research. TPS-ISA 2021: 348-354 - [e3]Kim-Kwang Raymond Choo, Tommy H. Morris, Gilbert L. Peterson, Eric S. Imsand:
National Cyber Summit (NCS) Research Track 2020, Huntsville, AL, USA, June 2-4, 2020. Advances in Intelligent Systems and Computing 1271, Springer 2021, ISBN 978-3-030-58702-4 [contents] - 2020
- [e2]Kim-Kwang Raymond Choo, Thomas H. Morris, Gilbert L. Peterson:
National Cyber Summit, NCS 2019, Research Track, Huntsville, AL, USA, 4-6 June, 2019. Advances in Intelligent Systems and Computing 1055, Springer 2020, ISBN 978-3-030-31238-1 [contents]
2010 – 2019
- 2019
- [c29]Bashir M. Sabquat Bahar Talukder, Joseph Kerns, Biswajit Ray, Thomas H. Morris, Md. Tauhidur Rahman:
Exploiting DRAM Latency Variations for Generating True Random Numbers. ICCE 2019: 1-6 - [c28]SueAnne Griffith, Thomas H. Morris:
Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems. NCS 2019: 116-125 - [c27]Aaron Werth, Thomas H. Morris:
A Specification-Based Intrusion Prevention System for Malicious Payloads. NCS 2019: 153-168 - 2018
- [j17]Thiago Alves, Rishabh Das, Aaron Werth, Thomas H. Morris:
Virtualization of SCADA testbeds for cybersecurity research: A modular approach. Comput. Secur. 77: 531-546 (2018) - [j16]Thiago Alves, Thomas H. Morris:
OpenPLC: An IEC 61, 131-3 compliant open source industrial controller for cyber security research. Comput. Secur. 78: 364-379 (2018) - [j15]Thiago Alves, Rishabh Das, Thomas H. Morris:
Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controllers. IEEE Embed. Syst. Lett. 10(3): 99-102 (2018) - [j14]Uttam Adhikari, Thomas H. Morris, Shengyi Pan:
Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection. IEEE Trans. Smart Grid 9(5): 3928-3941 (2018) - [j13]Uttam Adhikari, Thomas H. Morris, Shengyi Pan:
Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event and Intrusion Classification. IEEE Trans. Smart Grid 9(5): 4049-4060 (2018) - [c26]Karthikeyan Lingasubramanian, Ranveer Kumar, Nagendra Babu Gunti, Thomas H. Morris:
Study of hardware trojans based security vulnerabilities in cyber physical systems. ICCE 2018: 1-6 - [c25]Thiago Alves, Thomas H. Morris:
Hardware-based Cyber Threats. ICISSP 2018: 259-266 - [c24]Rishabh Das, Thomas H. Morris:
Modeling a Midstream Oil Terminal for Cyber Security Risk Evaluation. Critical Infrastructure Protection 2018: 149-175 - [e1]Sajal Bhatia, Alvaro A. Cárdenas, Ernest Foo, Marina Krotofil, Sye Loong Keoh, Thomas Locher, Daisuke Mashima, Tommy H. Morris, John Mulder, Stephen McLaughlin, Igor Nai Fovino, Julian L. Rrushi, Bradley L. Schatz, Jared Smith, Saman A. Zonouz, Tim Zimmerman:
Proceedings of the 4th Annual Industrial Control System Security Workshop, ICSS 2018, San Juan, PR, USA, December 4, 2018. ACM 2018, ISBN 978-1-4503-6220-7 [contents] - [i2]Bashir M. Sabquat Bahar Talukder, Joseph Kerns, Biswajit Ray, Thomas H. Morris, Md. Tauhidur Rahman:
Exploiting DRAM Latency Variations for Generating True Random Numbers. CoRR abs/1808.02068 (2018) - 2017
- [j12]Alan T. Sherman, Melissa Dark, Agnes H. Chan, Rylan Chong, Thomas H. Morris, Linda Oliva, John A. Springer, Bhavani Thuraisingham, Christopher Vatcher, Rakesh M. Verma, Susanne Wetzel:
INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research. IEEE Secur. Priv. 15(4): 72-78 (2017) - [j11]Uttam Adhikari, Thomas H. Morris, Shengyi Pan:
WAMS Cyber-Physical Test Bed for Power System, Cybersecurity Study, and Data Mining. IEEE Trans. Smart Grid 8(6): 2744-2753 (2017) - [c23]Thiago Alves, Thomas H. Morris, Seong-Moo Yoo:
Securing SCADA Applications Using OpenPLC With End-To-End Encryption. ICSS 2017: 1-6 - [i1]Alan T. Sherman, Melissa Dark, Agnes H. Chan, Rylan Chong, Thomas H. Morris, Linda Oliva, John A. Springer, Bhavani Thuraisingham, Christopher Vatcher, Rakesh M. Verma, Susanne Wetzel:
The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research. CoRR abs/1703.08859 (2017) - 2016
- [j10]Qian Chen, Madhulika Trivedi, Sherif Abdelwahed, Thomas H. Morris, Frederick T. Sheldon:
Model-based autonomic security management for cyber-physical infrastructures. Int. J. Crit. Infrastructures 12(4): 273-294 (2016) - [c22]Rayford B. Vaughn Jr., Tommy H. Morris:
Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation. CISRC 2016: 12:1-12:4 - [c21]Thiago Alves, Rishabh Das, Thomas H. Morris:
Virtualization of Industrial Control System Testbeds for Cybersecurity. ICSS 2016: 10-14 - 2015
- [j9]Shengyi Pan, Thomas H. Morris, Uttam Adhikari:
A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System. Int. J. Netw. Secur. 17(2): 174-188 (2015) - [j8]Shengyi Pan, Thomas H. Morris, Uttam Adhikari:
Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data. IEEE Trans. Ind. Informatics 11(3): 650-662 (2015) - [j7]Shengyi Pan, Thomas H. Morris, Uttam Adhikari:
Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems. IEEE Trans. Smart Grid 6(6): 3104-3113 (2015) - [c20]Zach Thornton, Thomas H. Morris:
Enhancing a Virtual SCADA Laboratory Using Simulink. Critical Infrastructure Protection 2015: 119-133 - 2014
- [j6]Wei Gao, Thomas H. Morris:
On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems. J. Digit. Forensics Secur. Law 9(1): 37-56 (2014) - [c19]Thomas H. Morris, Wei Gao:
Industrial Control System Traffic Data Sets for Intrusion Detection Research. Critical Infrastructure Protection 2014: 65-78 - 2013
- [j5]Anurag Srivastava, Thomas H. Morris, Timothy Ernster, Ceeman Vellaithurai, Shengyi Pan, Uttam Adhikari:
Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information. IEEE Trans. Smart Grid 4(1): 235-244 (2013) - [c18]Thomas H. Morris, Rayford B. Vaughn, Elena Sitnikova:
Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security. AISC 2013: 67-76 - [c17]Rayford B. Vaughn, Thomas H. Morris, Elena Sitnikova:
Development & expansion of an industrial control system security laboratory and an international research collaboration. CSIIRW 2013: 18 - [c16]Shengyi Pan, Thomas H. Morris, Uttam Adhikari, Vahid Madani:
Causal event graphs cyber-physical system intrusion detection system. CSIIRW 2013: 40 - [c15]Read Sprabery, Thomas H. Morris, Shengyi Pan, Uttam Adhikari, Vahid Madani:
Protocol mutation intrusion detection for synchrophasor communications. CSIIRW 2013: 41 - [c14]Frederick T. Sheldon, Daniel Fetzer, David O. Manz, Jingshan Huang, Stuart Goose, Thomas H. Morris, Jiangbo Dang, Jonathan Kirsch, Dong Wei:
Intrinsically resilient energy control systems. CSIIRW 2013: 63 - [c13]Thomas H. Morris, Bryan A. Jones, Rayford B. Vaughn, Yoginder S. Dandass:
Deterministic Intrusion Detection Rules for MODBUS Protocols. HICSS 2013: 1773-1781 - [c12]Thomas H. Morris, Wei Gao:
Industrial Control System Cyber Attacks. ICS-CSR 2013 - 2012
- [j4]Bradley Reaves, Thomas H. Morris:
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems. Int. J. Crit. Infrastructure Prot. 5(3-4): 154-174 (2012) - [j3]Bradley Reaves, Thomas H. Morris:
An open virtual testbed for industrial control system security research. Int. J. Inf. Sec. 11(4): 215-229 (2012) - [c11]Thomas H. Morris, Rayford B. Vaughn, Yoginder S. Dandass:
A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems. HICSS 2012: 2338-2345 - [c10]Frederick T. Sheldon, Jingshan Huang, Jiangbo Dang, Daniel Fetzer, Stuart Goose, Jonathan Kirsch, David O. Manz, Thomas H. Morris, Dong Wei:
Intrinsically Resilient Energy Control Systems. STIDS 2012: 96-103 - 2011
- [j2]Thomas H. Morris, Anurag Srivastava, Bradley Reaves, Wei Gao, Kalyan Pavurapu, Ram Reddi:
A control system testbed to validate critical infrastructure protection concepts. Int. J. Crit. Infrastructure Prot. 4(2): 88-103 (2011) - [c9]Thomas H. Morris, Shengyi Pan, Jeremy Lewis, Jonathan Moorhead, Nicolas H. Younan, Roger L. King, Mark Freund, Vahid Madani:
Cybersecurity risk testing of substation phasor measurement units and phasor data concentrators. CSIIRW 2011: 24 - [c8]Thomas H. Morris, Rayford B. Vaughn, Yoginder S. Dandass:
A testbed for SCADA control system cybersecurity research and pedagogy. CSIIRW 2011: 27 - 2010
- [j1]Thomas H. Morris, V. S. S. Nair:
Private computing on public platforms: portable application security. Wirel. Commun. Mob. Comput. 10(7): 942-958 (2010) - [c7]Wei Gao, Thomas H. Morris, Bradley Reaves, Drew Richey:
On SCADA control system command and response injection and intrusion detection. eCrime 2010: 1-9
2000 – 2009
- 2009
- [c6]Bradley Reaves, Thomas H. Morris:
Discovery, infiltration, and denial of service in a process control system wireless network. eCrime 2009: 1-9 - [c5]Thomas H. Morris, V. S. S. Nair:
Encryption Key Protection for Private Computing on Public Platforms. PerCom Workshops 2009: 1-6 - 2008
- [c4]Thomas H. Morris, V. S. S. Nair:
Privacy Protected ELF for Private Computing on Public Platforms. ARES 2008: 452-457 - [c3]Thomas H. Morris, V. S. S. Nair:
Secure Context Switch for Private Computing on Public Platforms. GLOBECOM 2008: 2159-2163 - 2007
- [c2]Thomas H. Morris, V. S. S. Nair:
PCPP: On Remote Host Assessment via Naive Bayesian Classification. IPDPS 2007: 1-8
1990 – 1999
- 1999
- [c1]Mitra Rocca, V. Lawrence Kudryk, John C. Pajak, Tommy H. Morris:
The evolution of a teledentistry system within the Department of Defense. AMIA 1999
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint