[go: up one dir, main page]

Follow
Anhtuan Le
Anhtuan Le
Verified email at warwick.ac.uk
Title
Cited by
Cited by
Year
A specification-based IDS for detecting attacks on RPL-based network topology
A Le, J Loo, KK Chai, M Aiash
Information 7 (2), 25, 2016
2622016
The impact of rank attack on network topology of routing protocol for low-power and lossy networks
A Le, J Loo, A Lasebae, A Vinel, Y Chen, M Chai
IEEE Sensors Journal 13 (10), 3685-3692, 2013
2372013
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
A Le, J Loo, A Lasebae, M Aiash, Y Luo
International Journal of Communication Systems 25 (9), 1189-1212, 2012
1882012
Specification-based IDS for securing RPL from topology attacks
A Le, J Loo, Y Luo, A Lasebae
2011 IFIP Wireless Days (WD), 1-3, 2011
1702011
The impacts of internal threats towards routing protocol for low power and lossy network performance
A Le, J Loo, Y Luo, A Lasebae
2013 IEEE symposium on computers and communications (ISCC), 000789-000794, 2013
1042013
Pains, gains and {PLCs}: Ten lessons from building an industrial control systems testbed for security research
B Green, A Lee, R Antrobus, U Roedig, D Hutchison, A Rashid
10th USENIX workshop on cyber security experimentation and test (CSET 17), 2017
982017
A connected and autonomous vehicle reference architecture for attack surface analysis
C Maple, M Bradbury, AT Le, K Ghirardello
Applied Sciences 9 (23), 5101, 2019
782019
Shadows don't lie: n-sequence trajectory inspection for misbehaviour detection and classification in vanets
A Le, C Maple
2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), 1-6, 2019
322019
Assessing loss event frequencies of smart grid cyber threats: Encoding flexibility into fair using bayesian network approach
A Le, Y Chen, KK Chai, A Vasenev, L Montoya
Smart Grid Inspired Future Technologies: First International Conference …, 2016
222016
Incorporating FAIR into bayesian network for numerical assessment of loss event frequencies of smart grid cyber threats
A Le, Y Chen, KK Chai, A Vasenev, L Montoya
Mobile Networks and Applications 24 (5), 1713-1721, 2019
212019
A profile-driven dynamic risk assessment framework for connected and autonomous vehicles
A Le, C Maple, T Watson
Living in the Internet of Things: Cybersecurity of the IoT-2018, 1-8, 2018
172018
Specification-based IDS for securing RPL from topology attacks. In 2011 IFIP Wireless Days (WD)
A Le, J Loo, Y Luo, A Lasebae
October, Niagara Falls, Ontario, Canada, 1-3, 2011
162011
Lasarus: Lightweight attack surface reduction for legacy industrial control systems
A Le, U Roedig, A Rashid
International Symposium on Engineering Secure Software and Systems, 36-52, 2017
122017
A simplified approach for dynamic security risk management in connected and autonomous vehicles
A Le, C Maple
Living in the Internet of Things (IoT 2019), 1-8, 2019
112019
A comparative cyber risk analysis between federated and self-sovereign identity management systems
A Le, G Epiphaniou, C Maple
Data & Policy 5, e38, 2023
102023
Minimum requirements for space system cybersecurity-ensuring cyber access to space
G Falco, N Boschetti, A Viswanathan, B Bailey, C Maple, GK Kurt, ...
2024 IEEE 10th International Conference on Space Mission Challenges for …, 2024
92024
Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids
A Vasenev, L Montoya, A Ceccarelli, A Le, D Ionita
Smart Grid Inspired Future Technologies: First International Conference …, 2016
92016
Exchange routing information between new neighbor nodes to improve AODV performance
L Anhtuan, L Yuan
Information Technology: New Generations, 2009. ITNG'09. Sixth International …, 2009
8*2009
Towards a socio-technical approach for privacy requirements analysis for next-generation trusted research environments
L Carmichael, UI Atmaca, C Maple, S Taylor, B Pickering, M Surridge, ...
IET Conference Proceedings CP801 2022 (8), 169-180, 2022
42022
LiDAR Sensor Security of a Driverless Pod
DS Fowler, AT Le, C Maple
32021
The system can't perform the operation now. Try again later.
Articles 1–20