![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessDemonstration of new attacks on three healthcare network protocols in a lab environment
Healthcare delivery organizations such as hospitals are complex infrastructures comprising a broad range of networked devices. They include connected medical devices which can deliver health care, support hosp...
-
Chapter and Conference Paper
Actionable Cyber Threat Intelligence for Automated Incident Response
Applying Cyber Threat Intelligence for active cyber defence, while potentially very beneficial, is currently limited to predominantly manual use. In this paper, we propose an automated approach for using Cyber...
-
Article
Leveraging operational technology and the Internet of things to attack smart buildings
In recent years, the buildings where we spend most part of our life are rapidly evolving. They are becoming fully automated environments where energy consumption, access control, heating and many other subsyst...
-
Chapter and Conference Paper
A Matter of Life and Death: Analyzing the Security of Healthcare Networks
Healthcare Delivery Organizations (HDOs) are complex institutions where a broad range of devices are interconnected. This inter-connectivity brings security concerns and we are observing an increase in the num...
-
Chapter and Conference Paper
Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems
In smart buildings, physical components (e.g., controllers, sensors, and actuators) are interconnected and communicate with each other using network protocols such as BACnet. Many smart building networks are n...
-
Chapter and Conference Paper
Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks
In smart buildings, cyber-physical components (e.g., controllers, sensors, and actuators) communicate with each other using network protocols such as BACnet. Many of these devices are now connected to the Inte...
-
Chapter and Conference Paper
Hunting the Unknown
Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach rep...
-
Chapter and Conference Paper
What Websites Know About You
The need for privacy protection on the Internet is well recognized. Everyday users are asked to release personal information in order to use online services and applications. Service providers do not always ne...