A specification-based IDS for detecting attacks on RPL-based network topology A Le, J Loo, KK Chai, M Aiash Information 7 (2), 25, 2016 | 229 | 2016 |
The impact of rank attack on network topology of routing protocol for low-power and lossy networks A Le, J Loo, A Lasebae, A Vinel, Y Chen, M Chai IEEE Sensors Journal 13 (10), 3685-3692, 2013 | 227 | 2013 |
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach A Le, J Loo, A Lasebae, M Aiash, Y Luo International Journal of Communication Systems 25 (9), 1189-1212, 2012 | 181 | 2012 |
Specification-based IDS for securing RPL from topology attacks A Le, J Loo, Y Luo, A Lasebae 2011 IFIP Wireless Days (WD), 1-3, 2011 | 162 | 2011 |
The impacts of internal threats towards routing protocol for low power and lossy network performance A Le, J Loo, Y Luo, A Lasebae 2013 IEEE symposium on computers and communications (ISCC), 000789-000794, 2013 | 98 | 2013 |
Pains, gains and {PLCs}: Ten lessons from building an industrial control systems testbed for security research B Green, A Lee, R Antrobus, U Roedig, D Hutchison, A Rashid 10th USENIX workshop on cyber security experimentation and test (CSET 17), 2017 | 84 | 2017 |
A connected and autonomous vehicle reference architecture for attack surface analysis C Maple, M Bradbury, AT Le, K Ghirardello Applied Sciences 9 (23), 5101, 2019 | 60 | 2019 |
Shadows don't lie: n-sequence trajectory inspection for misbehaviour detection and classification in vanets A Le, C Maple 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), 1-6, 2019 | 26 | 2019 |
Assessing loss event frequencies of smart grid cyber threats: Encoding flexibility into fair using bayesian network approach A Le, Y Chen, KK Chai, A Vasenev, L Montoya Smart Grid Inspired Future Technologies: First International Conference …, 2017 | 20 | 2017 |
Incorporating FAIR into bayesian network for numerical assessment of loss event frequencies of smart grid cyber threats A Le, Y Chen, KK Chai, A Vasenev, L Montoya Mobile Networks and Applications 24, 1713-1721, 2019 | 19 | 2019 |
A profile-driven dynamic risk assessment framework for connected and autonomous vehicles A Le, C Maple, T Watson IET Digital Library, 2018 | 15 | 2018 |
Lasarus: Lightweight attack surface reduction for legacy industrial control systems A Le, U Roedig, A Rashid Engineering Secure Software and Systems: 9th International Symposium, ESSoS …, 2017 | 10 | 2017 |
A simplified approach for dynamic security risk management in connected and autonomous vehicles A Le, C Maple Living in the Internet of Things (IoT 2019), 1-8, 2019 | 9 | 2019 |
Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids A Vasenev, L Montoya, A Ceccarelli, A Le, D Ionita Smart Grid Inspired Future Technologies: First International Conference …, 2017 | 9 | 2017 |
Exchange routing information between new neighbor nodes to improve AODV performance L Anhtuan, L Yuan Information Technology: New Generations, 2009. ITNG'09. Sixth International …, 2009 | 9* | 2009 |
Towards a socio-technical approach for privacy requirements analysis for next-generation trusted research environments L Carmichael, UI Atmaca, C Maple, S Taylor, B Pickering, M Surridge, ... Competitive Advantage in the Digital Economy (CADE 2022) 2022, 169-180, 2022 | 1 | 2022 |
LiDAR Sensor Security of a Driverless Pod DS Fowler, AT Le, C Maple | 1 | 2021 |
Minimum Requirements for Space System Cybersecurity-Ensuring Cyber Access to Space G Falco, N Boschetti, A Viswanathan, B Bailey, C Maple, GK Kurt, ... IEEE SMCIT, 2024 | | 2024 |
A comparative cyber risk analysis between federated and self-sovereign identity management systems A Le, G Epiphaniou, C Maple Data & Policy 5, e38, 2023 | | 2023 |
Preliminaries in automated red teaming in hardening digital identity management systems A Le, G Epiphaniou, C Maple IET Digital Library, 2023 | | 2023 |