default search action
Jonathan Butts
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j13]Jungsang Yoon, Stephen Dunlap, Jonathan Butts, Mason Rice, Benjamin W. P. Ramsey:
Evaluating the readiness of cyber first responders responsible for critical infrastructure protection. Int. J. Crit. Infrastructure Prot. 13: 19-27 (2016) - [j12]Stephen Dunlap, Jonathan Butts, Juan Lopez Jr., Mason Rice, Barry E. Mullins:
Using timing-based side channels for anomaly detection in industrial control systems. Int. J. Crit. Infrastructure Prot. 15: 12-26 (2016) - 2015
- [c14]Jonathan Butts, Michael Glover:
How Industrial Control System Security Training is Falling Short. Critical Infrastructure Protection 2015: 135-149 - 2014
- [j11]Robert D. Larkin, Juan Lopez Jr., Jonathan W. Butts, Michael R. Grimaila:
Evaluation of security solutions in the SCADA environment. Data Base 45(1): 38-53 (2014) - [j10]Carl Schuett, Jonathan Butts, Stephen Dunlap:
An evaluation of modification attacks on programmable logic controllers. Int. J. Crit. Infrastructure Prot. 7(1): 61-68 (2014) - [j9]Roland Bodenheim, Jonathan Butts, Stephen Dunlap, Barry E. Mullins:
Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. Int. J. Crit. Infrastructure Prot. 7(2): 114-123 (2014) - [c13]Chad Arnold, Jonathan Butts, Krishnaprasad Thirunarayan:
Detecting Integrity Attacks on Industrial Control Systems. Critical Infrastructure Protection 2014: 3-13 - [c12]Richard Agbeyibor, Jonathan Butts, Michael R. Grimaila, Robert F. Mills:
Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection. Critical Infrastructure Protection 2014: 245-261 - [e4]Jonathan Butts, Sujeet Shenoi:
Critical Infrastructure Protection VIII - 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers. IFIP Advances in Information and Communication Technology 441, Springer 2014, ISBN 978-3-662-45354-4 [contents] - 2013
- [j8]Cindy Finke, Jonathan Butts, Robert F. Mills, Michael R. Grimaila:
Enhancing the security of aircraft surveillance in the next generation air traffic control system. Int. J. Crit. Infrastructure Prot. 6(1): 3-11 (2013) - [j7]Zachry Basnight, Jonathan Butts, Juan Lopez Jr., Thomas Dubé:
Firmware modification attacks on programmable logic controllers. Int. J. Crit. Infrastructure Prot. 6(2): 76-84 (2013) - [c11]Cindy Finke, Jonathan Butts, Robert F. Mills:
ADS-B encryption: confidentiality in the friendly skies. CSIIRW 2013: 9 - [c10]Robert Jaromin, Barry E. Mullins, Jonathan W. Butts, Juan Lopez Jr.:
Design and Implementation of Industrial Control System Emulators. Critical Infrastructure Protection 2013: 35-46 - [e3]Jonathan Butts, Sujeet Shenoi:
Critical Infrastructure Protection VII - 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers. IFIP Advances in Information and Communication Technology 417, Springer 2013, ISBN 978-3-642-45329-8 [contents] - 2012
- [c9]Lucille McMinn, Jonathan Butts:
A Firmware Verification Tool for Programmable Logic Controllers. Critical Infrastructure Protection 2012: 59-69 - [c8]Henry Bushey, Juan Lopez Jr., Jonathan W. Butts:
Quantifying Controller Resilience Using Behavior Characterization. Critical Infrastructure Protection 2012: 71-83 - [e2]Jonathan Butts, Sujeet Shenoi:
Critical Infrastructure Protection VI - 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers. IFIP Advances in Information and Communication Technology 390, Springer 2012, ISBN 978-3-642-35763-3 [contents] - 2011
- [j6]Mason Rice, Jonathan Butts, Sujeet Shenoi:
A signaling framework to deter aggression in cyberspace. Int. J. Crit. Infrastructure Prot. 4(2): 57-65 (2011) - [j5]Donald McCallie, Jonathan Butts, Robert F. Mills:
Security analysis of the ADS-B implementation in the next generation air transportation system. Int. J. Crit. Infrastructure Prot. 4(2): 78-87 (2011) - [c7]Lucille McMinn, Jonathan Butts, David Robinson, Billy Rios:
Exploiting the critical infrastructure via nontraditional system inputs. CSIIRW 2011: 57 - [e1]Jonathan Butts, Sujeet Shenoi:
Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers. IFIP Advances in Information and Communication Technology 367, Springer 2011, ISBN 978-3-642-24863-4 [contents] - 2010
- [j4]Mason Rice, Jonathan Butts, Robert Miller, Sujeet Shenoi:
An analysis of the legality of government-mandated computer inoculations. Int. J. Crit. Infrastructure Prot. 3(1): 5-15 (2010) - [j3]Mason Rice, Jonathan Butts, Robert Miller, Sujeet Shenoi:
Applying public health strategies to the protection of cyberspace. Int. J. Crit. Infrastructure Prot. 3(3-4): 118-127 (2010) - [c6]Jonathan Butts, Mason Rice, Sujeet Shenoi:
Modeling Control System Failures and Attacks - The Waterloo Campaign to Oil Pipelines. Critical Infrastructure Protection 2010: 43-62 - [c5]Daniel Guernsey, Aaron Engel, Jonathan Butts, Sujeet Shenoi:
Security Analysis of the MPLS Label Distribution Protocol. Critical Infrastructure Protection 2010: 127-139
2000 – 2009
- 2009
- [j2]Denise Grayson, Daniel Guernsey, Jonathan Butts, Michael Spainhower, Sujeet Shenoi:
Analysis of security threats to MPLS virtual private networks. Int. J. Crit. Infrastructure Prot. 2(4): 146-153 (2009) - [c4]Samuel East, Jonathan Butts, Mauricio Papa, Sujeet Shenoi:
A Taxonomy of Attacks on the DNP3 Protocol. Critical Infrastructure Protection 2009: 67-81 - [c3]Jonathan Butts, Hugo Kleinhans, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi:
Providing Situational Awareness for Pipeline Control Operations. Critical Infrastructure Protection 2009: 97-111 - [c2]Hugo Kleinhans, Jonathan Butts, Sujeet Shenoi:
Password Cracking Using Sony Playstations. IFIP Int. Conf. Digital Forensics 2009: 215-227 - 2008
- [j1]Michael Spainhower, Jonathan Butts, Daniel Guernsey, Sujeet Shenoi:
Security analysis of RSVP-TE signaling in MPLS networks. Int. J. Crit. Infrastructure Prot. 1: 68-74 (2008) - 2005
- [c1]Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin:
Developing an Insider Threat Model Using Functional Decomposition. MMM-ACNS 2005: 412-417
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint