Clifford Neuman
Affiliations: | University of Southern California, Los Angeles, CA, United States |
Area:
Computer ScienceGoogle:
"Clifford Neuman"Children
Sign in to add traineeEul G. Im | grad student | 2002 | USC |
Sukumal Imudom | grad student | 2002 | USC |
Tatyana V. Ryutov | grad student | 2002 | USC |
Sultan Almuhammadi | grad student | 2005 | USC |
Ho S. Chung | grad student | 2009 | USC |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Wadhawan Y, Neuman C, AlMajali A. (2020) IGNORE: A Policy Server to Prevent Cyber-Attacks from Propagating to the Physical Domain Applied Sciences. 10: 6236 |
Wadhawan Y, AlMajali A, Neuman C. (2018) A Comprehensive Analysis of Smart Grid Systems against Cyber-Physical Attacks Electronics. 7: 249 |
Ryutov T, Almajali A, Neuman C. (2015) Modeling security policies for mitigating the risk of load altering attacks on smart grid systems 2015 Workshop On Modeling and Simulation of Cyber-Physical Energy Systems, Mscpes 2015 - Held as Part of Cps Week, Proceedings |
Neuman C, Tan K. (2011) Mediating cyber and physical threat propagation in secure smart grid architectures 2011 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2011. 238-243 |
Ryutov T, Neuman C, Zhou L, et al. (2007) Initial trust formation in Virtual Organisations International Journal of Internet Technology and Secured Transactions. 1: 81-94 |
Chung H, Neuman C. (2006) Modelling the relative strength of security protocols Proceedings of the 2nd Acm Workshop On Quality of Protection, Qop'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 45-48 |
Almuhammadi S, Neuman C. (2005) Security and privacy using one-round zero-knowledge proofs Proceedings - Seventh Ieee International Conference On E-Commerce Technology, Cec 2005. 2005: 435-438 |
Bajcsy R, Kesidis G, Levitt K, et al. (2004) Cyber defense technology networking and evaluation Communications of the Acm. 47: 58 |
Ryutov T, Neuman C, Dongho K, et al. (2003) Integrated access control and intrusion detection for Web servers Ieee Transactions On Parallel and Distributed Systems. 14: 841-850 |
Ryutov T, Neuman C, Kim D. (2003) Dynamic authorization and intrusion response in distributed systems Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 1: 50-61 |