• Article  

      Graphical inference for multiple intrusion detection 

      Le, T.; Hadjicostis, Christoforos N. (2008)
      In this paper, we consider vulnerabilities of networked systems and develop a multiple intrusion detection system (MIDS) which operates by running belief propagation on an appropriately constructed weighted bipartite graph. ...
    • Conference Object  

      Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks 

      Stavrou, Eliana; Pitsillides, Andreas (2011)
      Wireless sensor networks (WSNs) have become a hot research topic in recent years and are considered to be one of the building blocks of pervasive computing. Many diverse, mission-critical applications are deployed, including ...
    • Conference Object  

      The wireless control network: Monitoring for malicious behavior 

      Sundaram, S.; Pajic, M.; Hadjicostis, Christoforos N.; Mangharam, R.; Pappas, G. J. (2010)
      We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly transmits an appropriate (stabilizing) linear ...