Follow
Hui Lin
Title
Cited by
Cited by
Year
Software-defined networking for smart grid resilience: Opportunities and challenges
X Dong, H Lin, R Tan, RK Iyer, Z Kalbarczyk
Proceedings of the 1st ACM workshop on cyber-physical system security, 61-68, 2015
2172015
Adapting bro into scada: building a specification-based intrusion detection system for the dnp3 protocol
H Lin, A Slagell, C Di Martino, Z Kalbarczyk, RK Iyer
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
1632013
Runtime semantic security analysis to detect and mitigate control-related attacks in power grids
H Lin, A Slagell, ZT Kalbarczyk, PW Sauer, RK Iyer
IEEE Transactions on Smart Grid 9 (1), 163-178, 2018
1242018
Self-healing attack-resilient PMU network for power system operation
H Lin, C Chen, J Wang, J Qi, D Jin, ZT Kalbarczyk, RK Iyer
IEEE Transactions on Smart Grid 9 (3), 1551-1565, 2018
1072018
Semantic security analysis of SCADA networks to detect malicious control commands in power grids
H Lin, A Slagell, Z Kalbarczyk, PW Sauer, RK Iyer
Proceedings of the first ACM workshop on Smart energy grid security, 29-34, 2013
712013
Safety-critical cyber-physical attacks: Analysis, detection, and mitigation
H Lin, H Alemzadeh, D Chen, Z Kalbarczyk, RK Iyer
Proceedings of the Symposium and Bootcamp on the Science of Security, 82-89, 2016
332016
Raincoat: Randomization of network communication in power grid cyber infrastructure to mislead attackers
H Lin, ZT Kalbarczyk, RK Iyer
IEEE Transactions on Smart Grid 10 (5), 4893-4906, 2019
252019
DefRec: Establishing Physical FunctionVirtualization to Disrupt Reconnaissance of PowerGrids’ Cyber-Physical Infrastructures
H Lin, J Zhuang, YC Hu, H Zhou
The Proceedings of 2020 Network and Distributed System Security Symposium (NDSS), 2020
182020
Data-centric edge computing to defend power grids against IoT-based attacks
B Shrestha, H Lin
Computer 53 (5), 35-43, 2020
152020
Challenges and opportunities in the detection of safety-critical cyberphysical attacks
H Lin, H Alemzadeh, Z Kalbarczyk, R Iyer
Computer 53 (3), 26-37, 2020
122020
Sdn-based in-network honeypot: Preemptively disrupt and mislead attacks in iot networks
H Lin
Proceedings of the first International Workshop on Security and Privacy for …, 2018
112018
Multi-agent system for detecting false data injection attacks against the power grid
E Amullen, H Lin, Z Kalbarczyk, L Keel
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 38-44, 2016
112016
Micro-architecture support for integrity measurement on dynamic instruction trace
H Lin, G Lee
Journal of Information Security 1 (01), 1, 2010
82010
Indirect Branch Validation Unit
G Lee, Y Shi, H Lin
Microprocessors and Microsystems 33 (7-8), 461-468, 2009
62009
Cyber-Physical Testbed: Case Study to Evaluate Anti-Reconnaissance Approaches on Power Grids’ Cyber-Physical Infrastructures
H Lin, B Shrestha, YC Hu
Learning from Authoritative Security Experiment Results (LASER), 2020
52020
Toward scalable analysis of multidimensional scientific data: A case study of electrode arrays
Y Niu, A Al-Mamun, H Lin, T Li, Y Zhao, D Zhao
2018 IEEE International Conference on Big Data (Big Data), 3899-3904, 2018
42018
ElegNN: Electrical-model-guided graph neural networks for power distribution system state estimation
H Lin, Y Sun
GLOBECOM 2022-2022 IEEE Global Communications Conference, 5292-5298, 2022
22022
Impact of malicious scada commands on power grids’ dynamic responses
H Lin, Z Kalbarczyk, RK Iyer
2018 IEEE international conference on communications, control, and computing …, 2018
22018
Using a specification-based intrusion detection system to extend the DNP3 protocol with security functionalities
H Lin, A Slagell, Z Kalbarczyk, RK Iyer
Coordinated Science Laboratory Report no. UILU-ENG-12-2207, 2012
22012
Industrial network protocol security enhancement using programmable switches
Z Hu, H Lin, L Waind, Y Qu, G Chen, D Jin
2023 IEEE International Conference on Communications, Control, and Computing …, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20