Rakesh B Bobba
Title
Cited by
Cited by
Year
Detecting false data injection attacks on dc state estimation
RB Bobba, KM Rogers, Q Wang, H Khurana, K Nahrstedt, TJ Overbye
Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, 2010
4342010
Attribute-sets: A practically motivated enhancement to attribute-based encryption
R Bobba, H Khurana, M Prabhakaran
European Symposium on Research in Computer Security, 587-604, 2009
1962009
SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures
S Zonouz, KM Rogers, R Berthier, RB Bobba, WH Sanders, TJ Overbye
IEEE Transactions on Smart Grid 3 (4), 1790-1799, 2012
1502012
Bootstrapping security associations for routing in mobile ad-hoc networks
RB Bobba, L Eschenauer, V Gligor, W Arbaugh
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
1282003
AMI threats, intrusion detection requirements and deployment recommendations
D Grochocki, JH Huh, R Berthier, R Bobba, WH Sanders, AA Cárdenas, ...
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
1062012
Design principles for power grid cyber-infrastructure authentication protocols
H Khurana, R Bobba, T Yardley, P Agarwal, E Heine
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
942010
A framework integrating attribute-based policies into role-based access control
J Huang, DM Nicol, R Bobba, JH Huh
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
832012
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures
S Zonouz, CM Davis, KR Davis, R Berthier, RB Bobba, WH Sanders
IEEE Transaction on Smart Grid 5 (1), 3 -13, 2014
822014
A cyber-physical modeling and assessment framework for power grid infrastructures
KR Davis, CM Davis, SA Zonouz, RB Bobba, R Berthier, L Garcia, ...
IEEE Transactions on smart grid 6 (5), 2464-2475, 2015
782015
Using attribute-based access control to enable attribute-based messaging
R Bobba, O Fatemieh, F Khan, CA Gunter, H Khurana
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 403-413, 2006
662006
Topology perturbation for detecting malicious data injection
KL Morrow, E Heine, KM Rogers, RB Bobba, TJ Overbye
2012 45th Hawaii International Conference on System Sciences, 2104-2113, 2012
642012
PBES: a policy based encryption system with application to data sharing in the power grid
R Bobba, H Khurana, M AlTurki, F Ashraf
Proceedings of the 4th international symposium on information, computer, and …, 2009
592009
Power flow cyber attacks and perturbation-based defense
KR Davis, KL Morrow, R Bobba, E Heine
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
562012
Security of Smart Distribution Grids: Data Integrity Attacks on Integrated Volt/VAR Control and Countermeasures
A Teixeira, G Dán, H Sandberg, R Berthier, RB Bobba, A Valdes
American Control Conference, 2014
552014
Enhancing grid measurements: Wide area measurement systems, NASPInet, and security
RB Bobba, J Dagle, E Heine, H Khurana, WH Sanders, P Sauer, ...
IEEE Power and Energy Magazine 10 (1), 67-73, 2011
552011
Moving target defense for hardening the security of the power system state estimation
MA Rahman, E Al-Shaer, RB Bobba
Proceedings of the First ACM Workshop on Moving Target Defense, 59-68, 2014
542014
Reliable GPS-based timing for power systems: A multi-layered multi-receiver architecture
L Heng, JJ Makela, AD Dominguez-Garcia, RB Bobba, WH Sanders, ...
Power and Energy Conference at Illinois (PECI), 2014, 1-7, 2014
522014
Real-time systems security through scheduler constraints
S Mohan, MK Yoon, R Pellizzoni, R Bobba
2014 26th Euromicro Conference on Real-Time Systems, 129-140, 2014
492014
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures
AA Cárdenas, R Berthier, RB Bobba, JH Huh, JG Jetcheva, D Grochocki, ...
IEEE Transactions on Smart Grid 5 (2), 906-915, 2014
472014
Attribute-based messaging: Access control and confidentiality
R Bobba, O Fatemieh, F Khan, A Khan, CA Gunter, H Khurana, ...
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
442010
The system can't perform the operation now. Try again later.
Articles 1–20