Julian Rrushi
Julian Rrushi
Verified email at oakland.edu - Homepage
Cited by
Cited by
Detecting industrial control malware using automated plc code analytics
S Zonouz, J Rrushi, S McLaughlin
IEEE Security & Privacy 12 (6), 40-47, 2014
Introduction to cyberdeception
NC Rowe, J Rrushi
Springer International Publishing, 2016
Detecting anomalies in process control networks
J Rrushi, KD Kang
International Conference on Critical Infrastructure Protection, 151-165, 2009
Vulnerability analysis of SCADA protocol binaries through detection of memory access taintedness
C Bellettini, JL Rrushi
2007 IEEE SMC Information Assurance and Security Workshop, 341-348, 2007
Composite intrusion detection in process control networks
J Rrushi
Universitą degli Studi di Milano, 2009
SCADA protocol vulnerabilities
JL Rrushi
Critical Infrastructure Protection, 150-176, 2012
Detecting cyber attacks on nuclear power plants
J Rrushi, R Campbell
International Conference on Critical Infrastructure Protection, 41-54, 2008
An exploration of defensive deception in industrial communication networks
JL Rrushi
International Journal of Critical Infrastructure Protection 4 (2), 66-75, 2011
Detecting attacks in power plant interfacing substations through probabilistic validation of attack-effect bindings
JL Rrushi, RH Campbell, U di Milano
SCADA Security Scientific Symposium, 2008
NIC displays to thwart malware attacks mounted from within the OS
JL Rrushi
Computers & Security 61, 59-71, 2016
A quantitative evaluation of the target selection of havex ics malware plugin
J Rrushi, H Farhangi, C Howey, K Carmichael, J Dabell
Industrial Control System Security (ICSS) Workshop, 2015
A field study of digital forensics of intrusions in the electrical power grid
E Sohl, C Fielding, T Hanlon, J Rrushi, H Farhangi, C Howey, ...
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and …, 2015
A product machine model for anomaly detection of interposition attacks on cyber-physical systems
C Bellettini, JL Rrushi
IFIP International Information Security Conference, 285-300, 2008
Dnic architectural developments for 0-knowledge detection of opc malware
J Rrushi
IEEE Transactions on Dependable and Secure Computing, 2018
Redirecting malware’s target selection with decoy processes
S Sutton, G Michilli, J Rrushi
IFIP Annual Conference on Data and Applications Security and Privacy, 398-417, 2019
A statistical approach to botnet virulence estimation
J Rrushi, E Mokhtari, AA Ghorbani
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
Combating memory corruption attacks on scada devices
C Bellettini, J Rrushi
International Conference on Critical Infrastructure Protection, 141-156, 2008
CyberRadar: a regression analysis approach to the identification of cyber-physical mappings in process control systems
JL Rrushi, KD Kang
Proceedings of the IEEE/ACM Workshop on Embedded Systems Security, Atlanta …, 2008
Securing IPv6-based mobile ad hoc networks through an artificial immune system
JL Rrushi
Neural Nets, 346-354, 2005
Honeypot Evader: Activity-guided Propagation versus Counter-evasion via Decoy OS Activity
J Rrushi
IEEE International Conference on Malicious and Unwanted Software, 2019
The system can't perform the operation now. Try again later.
Articles 1–20