Publications

ATENA Papers published in peer-reviewed journals, books and conference proceedings:

Scientific journals

2018

[1] Henriques, J.P., Caldeira F., Cruz, T., and Simões, P., “On the Use of Ontology Data for Protecting Critical Infrastructures”, Journal of Information Warfare, 2018 (submission on-going)

[2] Barbatsalou, K., Cruz, T., Simões, P., and Monteiro E., “Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence”, IEEE Access, October 2018, DOI: 10.1109/ACCESS.2018.2875068

[3] Graveto, V., Rosa, L., Cruz, T., and Simões, P. , “A Stealth Monitoring Mechanism for Cyber-Physical Systems”, International Journal of Critical Infrastructure Protection, October 2018 DOI: 10.1016/j.ijcip.2018.10.006

[4] Perez, R., Adamsky, F., Soua, R., and Engel, T., “Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems”, 2018 (submission on-going) Abstract

[5] Adamsky, F., Aubigny, M., Battisti, F., Carli, M., Cimorelli, F., Cruz, T., Giorgio, A.D., Foglietta, C., Galli, A., Giuseppi, A., Liberati, F., Neri, A., Panzieri, S., Pascucci, F., Proença, J., Pucci, P., Rosa, L., and Soua, R., “Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach”, International Journal of Critical Infrastructure Protection – Elsevier, 2018

[6] Foglietta, C., Masucci, D., Palazzo, C., Santini, R., Panzieri, S., Rosa, L., Cruz, T., and Lev, L. , “From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment”, IEEE Systems Journal, 2018 

2017

[1] Stewart, B., Rosa, L., Maglaras, L., Cruz, T., Amine Ferrag, M., Simões, P., and Janicke, H., “Novel Intrusion Detection Mechanism for SCADA Systems that Automatically Adapts to Changes in Network Topology”, EAI Transactions in Industrial Networks and Intelligent Systems (INISCOM 2016 Special Edition with extended papers), January 2017Abstract

2016

[1] Cruz T., Simões P. and Monteiro E., “Virtualizing Programmable Logic Controllers: Towards a Convergent Approach”, in the IEEE Embedded Systems Letters, vol. 8, no. 4, December 2016, DOI: 10.1109/LES.2016.2608418.Abstract

[2] Cruz T., Queiroz R., Proença J., Simões P., Monteiro E., “Leveraging Virtualization Technologies to Improve SCADA ICS security”, Journal of Information Warfare, 15.3: 81-100 81, 2016, ISSN 1445-3312 (print) / 1445-3347 (online). Abstract

[3] Alonge, G., Ciancamerla, E., Mastrilli, A., Minichino, M., Nicotra, A., Ranno, M., Reali, M., and Regina, P., “Towards Energy Efficiency of Interdependent Urban Networks” in the  Int. J. Simulation and Process Modelling, Vol. 11, No. 6, 2016. Abstract

Conference papers

2018

[1] Freitas, M., Rosa, L., Cruz, T., and Simões, P. , “SDN-Enabled Virtual Data Diode”, in the 4th ESORICS Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS 2018), September 2018

[2] Perez, R., Adamsky, F., Soua, R., and Engel, T., “Machine Learning for Reliable Network Attack Detection in SCADA Systems”, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-18), 2018  Abstract

[3] Frazão, I., Abreu, P.H., Cruz, T., Araújo, H., and Simões, P., “Denial of Service Attacks: Detecting the Frailties of Machine Learning Algorithms in the Classification Process”, in the 13th edition of the International Conference on Critical Information Infrastructures Security (CRITIS 2018), September 24-26, 2018

[4] Henriques, J.P., Caldeira, F., Cruz, T., and Simões, P. , “On the Use of Ontology Data for Protecting Critical Infrastructures”, in the proc. of ECCWS 2018 – 17th European Conference on Cyber Warfare and Security, 2018

2017

[1] Proença J., Cruz T., Simões P., Gaspar G., Parreira B., Laranjeira A., and Bastos F., “Building an NFV-Based vRGW: Lessons Learned”, in the proc. of the 14th Annual IEEE Consumer Communications and Networking Conference (CCNC 2017), Las Vegas, USA, January  2017, pp. 73-78.Abstract

[2] Rosa L., Cruz T., Simões P., Monteiro E., and Lev L. (2017), “Attacking SCADA systems: a practical perspective”, in the proc. of the 15th IFIP/IEEE International Symposium on Integrated Management (IM 2017), Lisbon, Protugal, 8-12th May 2017.Abstract

[3] Muller S., Harpes C., Le Traon Y., Gombault S., Bonnin J.-M., and Hoffmann P., Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures, in the 11th edition of the International Conference on Critical Information Infrastructures Security (CRITIS 2016), published 2017

[4] Rosa, L., Proença, J., Henriques, J.P., Graveto, V., Cruz, T., Simões, P., Caldeira, F., and Monteiro, E., “An Evolved Security Architecture for Distributed Industrial Automation and Control Systems”, in the 16th European Conference on Cyber Warfare and Security (ECCWS 2017). Abstract

[5] Lima, A., Cruz, T., Sousa, B., and Simões, P, “Security Monitoring for Mobile Device Assets: a Survey”, in the 12th International Conference on Cyber Warfare and Security – ICCWS 2017. Abstract

[6] Di Giorgio, A., Giuseppi, A., Liberati, F., Ornatelli, A., Rabezzano, A., and Celsi, L.R., On the Optimization of Energy Storage System Placement for Protecting Power Transmission Grids Against Dynamic Load Altering Attacks”,  in the 25th Mediterranean Conference on Control and Automation (MED), Valletta, 2017, pp. 986-992

[7] Di Giorgio, A., Giuseppi, A., Liberati, F., and Pietrabissa, A., Controlled Electricity Distribution Network Black Start with Energy Storage System Support”, 25th Mediterranean Conference on Control and Automation (MED), Valletta, 2017, pp. 781-786

2016

[1] Masucci D., Foglietta C., Palazzo C. and Panzieri S. (2016), “Improved Multi-Criteria Distribution Network Reconfiguration with Information Fusion”, 19th International Conference on Information Fusion (FUSION), Heidelberg, Germany, July 2016, pp.256-263.Abstract

[2] Santini R., Gasparri A., Pasqualetti F, “Network Composition for Optimal Disturbance Rejection”, American Control Conference (ACC), Boston, MA, USA, July 2016, pp.3764-3769.Abstract

[3] Foglietta C., Corbò G., Palazzo C. and Panzieri S. (2016), “Smart Behavioural Filter for SCADA Network”, submitted at 2nd EAI International Conference on Industrial Networks and Intelligent Systems, Leicester, UK, October – November 2016.Abstract

[4] Cruz T., Simões P. and Monteiro E. (2016), “Security implications of SCADA ICS virtualization: survey and future trends”, in ECCWS 2016 – 15th European Conference on Cyber Warfare and Security, Munich, Germany, 7 – 8th July 2016, ISBN: 978-1-910810-93-4.Abstract

[5] E. Ciancamerla, B. Fresilli, M. Minichino, T. Patriarca, “Cyber attacks on SCADA of critical infrastructures by an hybrid testbed “Proceeding of 13th International Multidisciplinary Modeling and Simulation Multiconference (I3M 2016), Larnaca, Cyprus 26-28 September 2016, Editors: Agostino Bruzzone, Robert Sottilare, ISBN: 978-1-5108-3084.Abstract

[6] E. Ciancamerla, M.C. Falvo, L. Martirano, M. Minichino “Active distribution grids: a MatLab-Simulink tool for energy performance analysis”, AEIT 2016 annual international conference, Capri 5-7 october 2016.Abstract