On the Security of Machine Learning in Malware C&C Detection: A Survey J Gardiner, S Nagaraja ACM Computing Surveys (CSUR) 49 (3), 59, 2016 | 164 | 2016 |
Command & Control: Understanding, Denying and Detecting J Gardiner, M Cova, S Nagaraja CoRR, 2014 | 51* | 2014 |
Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds J Gardiner, B Craggs, B Green, A Rashid ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC). ACM Press, 2019 | 39 | 2019 |
Everything is Awesome! Or is it?: Cyber Security Risks in Critical Infrastructure A Rashid, J Gardiner, B Green, B Craggs | 17 | 2019 |
SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools E Samanis, J Gardiner, A Rashid Proceedings of the 17th International Conference on Availability …, 2022 | 14 | 2022 |
Old MacDonald had a smart farm: Building a testbed to study cybersecurity in smart dairy farming S Agarwal, A Rashid, J Gardiner Proceedings of the 15th Workshop on Cyber Security Experimentation and Test, 1-9, 2022 | 10 | 2022 |
Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures RJ Thomas, J Gardiner, T Chothia, E Samanis, J Perrett, A Rashid Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 49-60, 2020 | 10 | 2020 |
Blindspot: Indistinguishable Anonymous Communications J Gardiner, S Nagaraja arXiv preprint arXiv:1408.0784, 2014 | 9* | 2014 |
On the reliability of network measurement techniques used for malware traffic analysis J Gardiner, S Nagaraja Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014 | 8 | 2014 |
StegChat: A Synonym-Substitution Based Algorithm for Text Steganography J Gardiner, S Nagaraja | 8 | 2012 |
Threat Models over Space and Time: A Case Study of E2EE Messaging Applications PD Chowdhury, M Sameen, J Blessing, N Boucher, J Gardiner, T Burrows, ... arXiv preprint arXiv:2301.05653, 2023 | 7 | 2023 |
Security Threats in Electric Vehicle Charging A Ahalawat, S Adepu, J Gardiner 2022 IEEE International Conference on Communications, Control, and Computing …, 2022 | 7 | 2022 |
Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems J Gardiner, A Eiffert, P Garraghan, N Race, S Nagaraja, A Rashid Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 63-68, 2021 | 5 | 2021 |
Adaptive Cyber Security for Critical Infrastructure E Samanis, J Gardiner, A Rashid 2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS …, 2022 | 3 | 2022 |
A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts F Shahbi, J Gardiner, S Adepu, A Rashid 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2023 | 2 | 2023 |
The Internet of Insecure Cows-A Security Analysis of Wireless Smart Devices Used for Dairy Farming S Barnes-Thornton, J Gardiner, A Rashid Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 67-73, 2023 | 1 | 2023 |
Building A privacy testbed: Use cases and design considerations J Gardiner, P Das Chowdhury, J Halsey, M Tahaei, T Elahi, A Rashid Computer Security. ESORICS 2021 International Workshops: CyberICPS, SECPRE …, 2022 | 1 | 2022 |
Technical Report: Gone in 20 Seconds--Overview of a Password Vulnerability in Siemens HMIs J Gardiner, A Rashid arXiv preprint arXiv:2009.03961, 2020 | 1 | 2020 |
RESTful HTTPS over Zigbee: Why and how? SY Lim, J Gardiner, B Craggs, A Rashid 6th International Symposium for ICS & SCADA Cyber Security Research 2019 6 …, 2019 | 1 | 2019 |
Capture The Industrial Flag: Lessons from hosting an ICS cybersecurity exercise S Abaimov, J Gardiner, E Samanis, J Williams, M Samanis, F Shahbi, ... Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 98-106, 2024 | | 2024 |