Follow
Julian Rrushi
Julian Rrushi
Associate Professor, Oakland University
Verified email at oakland.edu - Homepage
Title
Cited by
Cited by
Year
Introduction to cyberdeception
NC Rowe, J Rrushi
Springer International Publishing, 2016
892016
Detecting industrial control malware using automated PLC code analytics
S Zonouz, J Rrushi, S McLaughlin
IEEE Security & Privacy 12 (6), 40-47, 2014
872014
A quantitative evaluation of the target selection of havex ics malware plugin
J Rrushi, H Farhangi, C Howey, K Carmichael, J Dabell
Industrial control system security (ICSS) workshop, 1-5, 2015
362015
Vulnerability analysis of SCADA protocol binaries through detection of memory access taintedness
C Bellettini, JL Rrushi
2007 IEEE SMC Information Assurance and Security Workshop, 341-348, 2007
352007
Detecting anomalies in process control networks
J Rrushi, KD Kang
Critical Infrastructure Protection III: Third Annual IFIP WG 11.10 …, 2009
332009
SCADA protocol vulnerabilities
JL Rrushi
Critical Infrastructure Protection: Information Infrastructure Models …, 2012
322012
Detecting cyber attacks on nuclear power plants
J Rrushi, R Campbell
Critical Infrastructure Protection II 2, 41-54, 2008
252008
An exploration of defensive deception in industrial communication networks
JL Rrushi
International Journal of Critical Infrastructure Protection 4 (2), 66-75, 2011
222011
Composite intrusion detection in process control networks
J Rrushi
Università degli Studi di Milano, 2009
222009
NIC displays to thwart malware attacks mounted from within the OS
JL Rrushi
Computers & Security 61, 59-71, 2016
212016
Detecting attacks in power plant interfacing substations through probabilistic validation of attack-effect bindings
JL Rrushi, RH Campbell, U di Milano
SCADA Security Scientific Symposium, 2008
192008
Honeypot Evader: Activity-guided Propagation versus Counter-evasion via Decoy OS Activity
J Rrushi
IEEE International Conference on Malicious and Unwanted Software, 2019
152019
Dnic architectural developments for 0-knowledge detection of opc malware
JL Rrushi
IEEE Transactions on Dependable and Secure Computing 18 (1), 30-44, 2018
152018
A field study of digital forensics of intrusions in the electrical power grid
E Sohl, C Fielding, T Hanlon, J Rrushi, H Farhangi, C Howey, ...
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and …, 2015
152015
A product machine model for anomaly detection of interposition attacks on cyber-physical systems
C Bellettini, JL Rrushi
IFIP International Information Security Conference, 285-300, 2008
112008
Protecting location privacy for crowd workers in spatial crowdsourcing using a novel dummy-based mechanism
RS Alharthi, E Aloufi, I Alrashdi, A Alqazzaz, MA Zohdy, JL Rrushi
IEEE Access 8, 114608-114622, 2020
92020
Redirecting malware’s target selection with decoy processes
S Sutton, G Michilli, J Rrushi
Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 …, 2019
82019
Keylogger detection using a decoy keyboard
S Simms, M Maxwell, S Johnson, J Rrushi
Data and Applications Security and Privacy XXXI: 31st Annual IFIP WG 11.3 …, 2017
82017
A statistical approach to botnet virulence estimation
J Rrushi, E Mokhtari, AA Ghorbani
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
82011
Combating memory corruption attacks on scada devices
C Bellettini, J Rrushi
Critical Infrastructure Protection II 2, 141-156, 2008
72008
The system can't perform the operation now. Try again later.
Articles 1–20