This dissertation treats a variety of topics in the computer security domain which have direct impact on everyday life. The first extends false data injection attacks against state estimation in electric power grids and then provides a novel power flow model camouflage method to hamper these attacks. The second deals with automotive theft response, detailing a method for a car to intelligently identify when it has been stolen, based on collected behavioral traits of its driver. The third demonstrates a new attack against the content integrity of the PDF file format, caus- ing humans and computers to see different information within the same PDF documents. This dissertation lastly describes some future work efforts, identifying some potentia...
The increased computational power and connectivity in modern Cyber-Physical Systems (CPS) inevitably...
Organizations and individuals maintain and use an ever increasing amount of computer systems, either...
This dissertation focuses on computer crimes and security considerations on the Internet. Computer b...
This dissertation treats a variety of topics in the computer security domain which have direct impac...
This dissertation includes three approaches we have been designed to tackle threats and challenges i...
People and their inherent need for security.Security and its enabling capabilities.New technologies ...
The Internet has witnessed a tremendous growth the last years. Undoubtedly, its services and mostly ...
Most computerized information systems we use in our everyday lives provide very little protection ag...
With a growing number of users getting connected to the Internet and given their growing reliance on...
Cyber-physical Systems (CPS) present special problems for security. This dissertation examines the c...
The work in this dissertation focuses on two examples of Cyber-Physical Systems (CPS), integrations ...
The thesis examines computer threats and countermeasures on modern world focusing on the use of pers...
Machine learning systems are becoming widely adopted and ubiquitous. Not only are there a growth of ...
Cyber-Physical Systems (CPS) are integrated systems that consist of the computational and physical c...
The paper contains information about hacking types and systems which they are suffered the most cybe...
The increased computational power and connectivity in modern Cyber-Physical Systems (CPS) inevitably...
Organizations and individuals maintain and use an ever increasing amount of computer systems, either...
This dissertation focuses on computer crimes and security considerations on the Internet. Computer b...
This dissertation treats a variety of topics in the computer security domain which have direct impac...
This dissertation includes three approaches we have been designed to tackle threats and challenges i...
People and their inherent need for security.Security and its enabling capabilities.New technologies ...
The Internet has witnessed a tremendous growth the last years. Undoubtedly, its services and mostly ...
Most computerized information systems we use in our everyday lives provide very little protection ag...
With a growing number of users getting connected to the Internet and given their growing reliance on...
Cyber-physical Systems (CPS) present special problems for security. This dissertation examines the c...
The work in this dissertation focuses on two examples of Cyber-Physical Systems (CPS), integrations ...
The thesis examines computer threats and countermeasures on modern world focusing on the use of pers...
Machine learning systems are becoming widely adopted and ubiquitous. Not only are there a growth of ...
Cyber-Physical Systems (CPS) are integrated systems that consist of the computational and physical c...
The paper contains information about hacking types and systems which they are suffered the most cybe...
The increased computational power and connectivity in modern Cyber-Physical Systems (CPS) inevitably...
Organizations and individuals maintain and use an ever increasing amount of computer systems, either...
This dissertation focuses on computer crimes and security considerations on the Internet. Computer b...