default search action
Julian L. Rrushi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Hussam Tarazi, Sara M. Sutton, John Olinjyk, Benjamin Bond, Julian L. Rrushi:
A watchdog model for physics-based anomaly detection in digital substations. Int. J. Crit. Infrastructure Prot. 44: 100660 (2024) - 2023
- [j13]Sara M. Sutton, Julian L. Rrushi:
Decoy Processes With Optimal Performance Fingerprints. IEEE Access 11: 43216-43237 (2023) - 2022
- [j12]John Olijnyk, Benjamin Bond, Julian L. Rrushi:
Design and Emulation of Physics-Centric Cyberattacks on an Electrical Power Transformer. IEEE Access 10: 15227-15246 (2022) - [j11]Julian L. Rrushi:
Physics-Driven Page Fault Handling for Customized Deception against CPS Malware. ACM Trans. Embed. Comput. Syst. 21(3): 23:1-23:36 (2022) - 2021
- [j10]Julian L. Rrushi:
DNIC Architectural Developments for 0-Knowledge Detection of OPC Malware. IEEE Trans. Dependable Secur. Comput. 18(1): 30-44 (2021) - [c27]Tallal Omar, Mohamed A. Zohdy, Julian L. Rrushi:
Clustering Application for Data-Driven Prediction of Health Insurance Premiums for People of Different Ages. ICCE 2021: 1-6 - 2020
- [j9]Raed Alharthi, Esam Aloufi, Ibrahim Alrashdi, Ali Alqazzaz, Mohamed A. Zohdy, Julian L. Rrushi:
Protecting Location Privacy for Crowd Workers in Spatial Crowdsourcing Using a Novel Dummy-Based Mechanism. IEEE Access 8: 114608-114622 (2020) - [c26]Haissam Badih, Yasamin Alagrash, Julian L. Rrushi:
A Blockchain and Defensive Deception Co-design for Webcam Spyware Detection. DASC/PiCom/CBDCom/CyberSciTech 2020: 593-600 - [c25]Yasamin Alagrash, Haissam Badih, Julian L. Rrushi:
Malware Detection via Machine Learning and Recognition of Non Stationary Tasks. DASC/PiCom/CBDCom/CyberSciTech 2020: 606-611 - [c24]Haissam Badih, Benjamin Bond, Julian L. Rrushi:
On Second-Order Detection of Webcam Spyware. ICICT 2020: 424-431 - [c23]Mohammad A. Yahya, Nasir Sharaf, Julian L. Rrushi, Ho Ming Tay, Bing Liu, Kai Xu:
Physics Reasoning for Intrusion Detection in Industrial Networks. TPS-ISA 2020: 273-283
2010 – 2019
- 2019
- [c22]Sara M. Sutton, Garret Michilli, Julian L. Rrushi:
Redirecting Malware's Target Selection with Decoy Processes. DBSec 2019: 398-417 - [c21]Yasamin Alagrash, Nithasha Mohan, Sandhya Rani Gollapalli, Julian L. Rrushi:
Machine Learning and Recognition of User Tasks for Malware Detection. TPS-ISA 2019: 73-81 - [c20]Sara M. Sutton, Benjamin Bond, Sementa Tahiri, Julian L. Rrushi:
Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency. TPS-ISA 2019: 110-119 - [p2]Julian L. Rrushi:
Multi-range Decoy I/O Defense of Electrical Substations Against Industrial Control System Malware. Resilience of Cyber-Physical Systems 2019: 151-175 - 2018
- [c19]Rory Klein, Tyler Barkley, Weston Clizbe, Jennifer Bateman, Julian L. Rrushi:
Model-driven Timing Consistency for Active Malware Redirection. MALWARE 2018: 132-141 - [e1]Sajal Bhatia, Alvaro A. Cárdenas, Ernest Foo, Marina Krotofil, Sye Loong Keoh, Thomas Locher, Daisuke Mashima, Tommy H. Morris, John Mulder, Stephen McLaughlin, Igor Nai Fovino, Julian L. Rrushi, Bradley L. Schatz, Jared Smith, Saman A. Zonouz, Tim Zimmerman:
Proceedings of the 4th Annual Industrial Control System Security Workshop, ICSS 2018, San Juan, PR, USA, December 4, 2018. ACM 2018, ISBN 978-1-4503-6220-7 [contents] - 2017
- [j8]Julian L. Rrushi:
Plaintext side channels in TLS Chiphertex. J. Comput. Virol. Hacking Tech. 13(1): 13-27 (2017) - [c18]Roberto M. Vergaray, Julian L. Rrushi:
On Sustaining Prolonged Interaction with Attackers. DASC/PiCom/DataCom/CyberSciTech 2017: 478-485 - [c17]Julian L. Rrushi:
Defending Electrical Substations Against 0-Day Malware Through Decoy I/O in Protective Relays. DASC/PiCom/DataCom/CyberSciTech 2017: 486-493 - [c16]James Halvorsen, Julian L. Rrushi:
Target Discovery Differentials for 0-Knowledge Detection of ICS Malware. DASC/PiCom/DataCom/CyberSciTech 2017: 542-549 - [c15]Seth Simms, Margot Maxwell, Sara Johnson, Julian L. Rrushi:
Keylogger Detection Using a Decoy Keyboard. DBSec 2017: 433-452 - [c14]Julian L. Rrushi:
Timing Performance Profiling of Substation Control Code for IED Malware Detection. ICSS 2017: 15-23 - [c13]Megan Leierzapf, Julian L. Rrushi:
Network Forensic Analysis of Electrical Substation Automation Traffic. Critical Infrastructure Protection 2017: 63-78 - [c12]Julian L. Rrushi:
Phantom I/O projector: Entrapping malware on machines in production. MALWARE 2017: 57-66 - 2016
- [b1]Neil C. Rowe, Julian L. Rrushi:
Introduction to Cyberdeception. Springer 2016, ISBN 978-3-319-41185-9, pp. 1-250 - [j7]Julian L. Rrushi:
NIC displays to thwart malware attacks mounted from within the OS. Comput. Secur. 61: 59-71 (2016) - 2015
- [c11]Eli Sohl, Curtis Fielding, Tyler Hanlon, Julian L. Rrushi, Hassan Farhangi, Clay Howey, Kelly Carmichael, Joey Dabell:
A Field Study of Digital Forensics of Intrusions in the Electrical Power Grid. CPS-SPC@CCS 2015: 113-122 - [c10]Julian L. Rrushi, Philip A. Nelson:
Big Data Computing for Digital Forensics on Industrial Control Systems. IRI 2015: 593-608 - [c9]Julian L. Rrushi, Hassan Farhangi, Radina Nikolic, Clay Howey, Kelly Carmichael, Ali Palizban:
By-design vulnerabilities in the ANSI C12.22 protocol specification. SAC 2015: 2231-2236 - 2014
- [j6]Saman A. Zonouz, Julian L. Rrushi, Stephen E. McLaughlin:
Detecting Industrial Control Malware Using Automated PLC Code Analytics. IEEE Secur. Priv. 12(6): 40-47 (2014) - [j5]Julian L. Rrushi, Ali A. Ghorbani:
A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management. J. Comput. Virol. Hacking Tech. 10(1): 29-51 (2014) - [c8]Julian L. Rrushi:
A Steganographic Approach to Localizing Botmasters. AINA Workshops 2014: 852-859 - [c7]Julian L. Rrushi:
Data Interception through Broken Concurrency in Kernel Land. HPCC/CSS/ICESS 2014: 785-793 - 2012
- [p1]Julian L. Rrushi:
SCADA Protocol Vulnerabilities. Critical Infrastructure Protection 2012: 150-176 - 2011
- [j4]Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani:
Estimating botnet virulence within mathematical models of botnet propagation dynamics. Comput. Secur. 30(8): 791-802 (2011) - [j3]Julian L. Rrushi:
A Bayesian theory of confirmation for intrusion report fusion in process control networks. Int. J. Crit. Comput. Based Syst. 2(2): 162-180 (2011) - [j2]Julian L. Rrushi:
An exploration of defensive deception in industrial communication networks. Int. J. Crit. Infrastructure Prot. 4(2): 66-75 (2011) - [j1]Julian L. Rrushi:
Anomaly detection via statistical learning in industrial communication networks. Int. J. Inf. Comput. Secur. 4(4): 295-315 (2011) - [c6]Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani:
A statistical approach to botnet virulence estimation. AsiaCCS 2011: 508-512
2000 – 2009
- 2009
- [c5]Julian L. Rrushi, Kyoung-Don Kang:
Detecting Anomalies in Process Control Networks. Critical Infrastructure Protection 2009: 151-165 - 2008
- [c4]Julian L. Rrushi, Roy H. Campbell:
Detecting Cyber Attacks On Nuclear Power Plants. Critical Infrastructure Protection 2008: 41-54 - [c3]Carlo Bellettini, Julian L. Rrushi:
Combating Memory Corruption Attacks On Scada Devices. Critical Infrastructure Protection 2008: 141-156 - [c2]Carlo Bellettini, Julian L. Rrushi:
A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems. SEC 2008: 285-300 - 2005
- [c1]Julian L. Rrushi:
Securing IPv6-Based Mobile Ad Hoc Networks Through an Artificial Immune System. WIRN/NAIS 2005: 346-354
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint