Robin Berthier
Robin Berthier
Verified email at illinois.edu
Title
Cited by
Cited by
Year
Intrusion detection for advanced metering infrastructures: Requirements and architectural directions
R Berthier, WH Sanders, H Khurana
2010 First IEEE International Conference on Smart Grid Communications, 350-355, 2010
2662010
Specification-based intrusion detection for advanced metering infrastructures
R Berthier, WH Sanders
2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing …, 2011
1902011
SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures
S Zonouz, KM Rogers, R Berthier, RB Bobba, WH Sanders, TJ Overbye
IEEE Transactions on Smart Grid 3 (4), 1790-1799, 2012
1452012
A multi-sensor energy theft detection framework for advanced metering infrastructures
S McLaughlin, B Holbert, A Fawaz, R Berthier, S Zonouz
IEEE Journal on Selected Areas in Communications 31 (7), 1319-1330, 2013
1282013
Profiling attacker behavior following SSH compromises
D Ramsbrock, R Berthier, M Cukier
37th Annual IEEE/IFIP international conference on dependable systems and …, 2007
1252007
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones
S Zonouz, A Houmansadr, R Berthier, N Borisov, W Sanders
Computers & Security 37, 215-227, 2013
1072013
A cloud-based intrusion detection and response system for mobile phones
A Houmansadr, SA Zonouz, R Berthier
2011 IEEE/IFIP 41st International Conference on Dependable Systems and …, 2011
1072011
AMI threats, intrusion detection requirements and deployment recommendations
D Grochocki, JH Huh, R Berthier, R Bobba, WH Sanders, AA Cárdenas, ...
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
1022012
CPIndex: Cyber-physical vulnerability assessment for power-grid infrastructures
C Vellaithurai, A Srivastava, S Zonouz, R Berthier
IEEE Transactions on Smart Grid 6 (2), 566-575, 2014
892014
Nfsight: netflow-based network awareness tool
R Berthier, M Cukier, M Hiltunen, D Kormann, G Vesonder, D Sheleheda
Proceedings of LISA’10: 24th Large Installation System Administration …, 2010
882010
SOCCA: A security-oriented cyber-physical contingency analysis in power infrastructures
S Zonouz, CM Davis, KR Davis, R Berthier, RB Bobba, WH Sanders
IEEE Transactions on Smart Grid 5 (1), 3-13, 2013
792013
A cyber-physical modeling and assessment framework for power grid infrastructures
KR Davis, CM Davis, SA Zonouz, RB Bobba, R Berthier, L Garcia, ...
IEEE Transactions on smart grid 6 (5), 2464-2475, 2015
692015
Security of smart distribution grids: Data integrity attacks on integrated volt/VAR control and countermeasures
A Teixeira, G Dán, H Sandberg, R Berthier, RB Bobba, A Valdes
2014 American Control Conference, 4372-4378, 2014
522014
AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures
S McLaughlin, B Holbert, S Zonouz, R Berthier
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
482012
A framework for evaluating intrusion detection architectures in advanced metering infrastructures
AA Cárdenas, R Berthier, RB Bobba, JH Huh, JG Jetcheva, D Grochocki, ...
IEEE Transactions on Smart Grid 5 (2), 906-915, 2014
472014
An internet-wide view of ics devices
A Mirian, Z Ma, D Adrian, M Tischer, T Chuenchujit, T Yardley, R Berthier, ...
2016 14th Annual Conference on Privacy, Security and Trust (PST), 96-103, 2016
462016
A statistical analysis of attack data to separate attacks
M Cukier, R Berthier, S Panjwani, S Tan
International Conference on Dependable Systems and Networks (DSN'06), 383-392, 2006
322006
Smart grid protocol testing through cyber-physical testbeds
T Yardley, R Berthier, D Nicol, WH Sanders
2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), 1-6, 2013
312013
Characterizing attackers and attacks: An empirical study
G Salles-Loustau, R Berthier, E Collange, B Sobesto, M Cukier
2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing …, 2011
292011
An evaluation of connection characteristics for separating network attacks
R Berthier, M Cukier
International Journal of Security and Networks 4 (1-2), 110-124, 2009
232009
The system can't perform the operation now. Try again later.
Articles 1–20