David Nicol
University of Illinois at Urbana-Champaign
H-index: 59
North America-United States
Top articles of David Nicol
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Computer Science Methods for Effective and Sustainable Simulation Studies (Dagstuhl Seminar 22401) | Report from Dagstuhl Seminar | Wentong Cai Christopher Carothers D Nicol A Uhrmacher | 2022 |
Toward Common Weakness Enumerations in Industrial Control Systems | IEEE Security & Privacy | David M Nicol Gregory Shannon Monika Akbar Matt Bishop Michael Chaney | 2023/7/25 |
CyberSAGE: The cyber security argument graph evaluation tool | Empirical Software Engineering | William G Temple Yue Wu Carmen Cheh Yuan Li Binbin Chen | 2023/1 |
3.11 Parallel Simulation–What Worked and What Not | Computer Science Methods for Effective and Sustainable Simulation Studies | Wentong Cai Christopher Carothers David M Nicol Adelinde M Uhrmacher | 2023/5 |
‘Establishing common input scenarios for security assessment | Adv. Digit. Sci. Center, Singapore, Tech. Rep | Xinshu Dong Sumeet Jauhar William G Temple Binbin Chen Zbigniew Kalbarczyk | 2023 |
3.22 Data Farming: Better Decisions Via Inferential Big Data | Computer Science Methods for Effective and Sustainable Simulation Studies | Wentong Cai Christopher Carothers David M Nicol Adelinde M Uhrmacher | 2023/5 |
3.27 Automatically Generating Simulation Experiments based on Provenance | Computer Science Methods for Effective and Sustainable Simulation Studies | Wentong Cai Christopher Carothers David M Nicol Adelinde M Uhrmacher | 2023/5 |
Cyber-Physical Systems | ACM Transactions on | H Mousavi A Ebnenasir E Mahmoudzadeh X Fan Q Wang | 2023 |
Message authentication and provenance verification for industrial control systems | ACM Transactions on Cyber-Physical Systems | Ertem Esiner Utku Tefek Daisuke Mashima Binbin Chen Zbigniew Kalbarczyk | 2023/10/14 |
Smart Grid Network Flows Best Practices Checker | David M Nicol Emily Belovich Atul Bohara | 2022/10/25 | |
Connectivity Preserving Anonymization of Smart Grid Network Configurations | David M Nicol | 2022/10/25 | |
Exploiting monotonicity and symmetry for efficient simulation of highly dependable systems | Hoang Hai Nguyen Kartik Palani David M Nicol | 2022/6/27 | |
Temporally synchronized emulation of devices with simulation of networks | Vignesh Babu David Nicol | 2022/6/8 | |
A security device and method of provenance verification | 2022/12/29 | ||
LoMoS: Less-online/more-offline signatures for extremely time-critical systems | IEEE Transactions on Smart Grid | Ertem Esiner Utku Tefek Hasan SM Erol Daisuke Mashima Binbin Chen | 2022/3/7 |
Message authentication | 2022/11/24 | ||
Mechanisms for precise virtual time advancement in network emulation | ACM Transactions on Modeling and Computer Simulation (TOMACS) | Vignesh Babu David Nicol | 2022/3/4 |
Vbump: Securing ethernet-based industrial control system networks with vlan-based traffic aggregation | Nils Ole Tippenhauer Binbin Chen Daisuke Mashima David M Nicol | 2021/11/15 | |
17 What We Have Here Is Failure to Validate: Summer of LangSec | Sameed Ali Prashant Anantharaman Zephyr Lucas Sean W Smith David M Nicol | 2021/5 | |
The ransomware threat to energy-delivery systems | IEEE Security & Privacy | David M Nicol | 2021/3/23 |