• Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols 

      Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen (Peer reviewed; Journal article, 2020)
      Adversarial models are well-established for cryptographic protocols, but distributed real-time protocols have requirements that these abstractions are not intended to cover. The IEEE/IEC 61850 standard for communication ...
    • Vulnerability Discovery Modelling With Vulnerability Severity 

      Ankur, Shukla; Katt, Basel; Nweke, Livinus Obiora (Peer reviewed; Journal article, 2019)
      Web browsers are primary targets of attacks because of their extensive uses and the fact that they interact with sensitive data. Vulnerabilities present in a web browser can pose serious risk to millions of users. Thus, ...