Skip to main content

Showing 1–5 of 5 results for author: Foreman, J C

Searching in archive cs. Search in all archives.
.
  1. arXiv:1807.10868  [pdf, other

    cs.CR

    A Survey of Cyber Security Countermeasures Using Hardware Performance Counters

    Authors: James Christopher Foreman

    Abstract: Cyber attacks and malware are now more prevalent than ever and the trend is ever upward. There have been several approaches to attack detection including resident software applications at the root or user level, e.g., virus detection, and modifications to the OS, e.g., encryption, application signing, etc. Some approaches have moved to lower level detection and preven- tion, e.g., Data Execution P… ▽ More

    Submitted 27 July, 2018; originally announced July 2018.

    Comments: 9 pages, 2 figures

  2. arXiv:1607.06992  [pdf, other

    cs.CR cs.CY eess.SY

    Architecture for Community-scale Critical Infrastructure Coordination for Security and Resilience

    Authors: James Christopher Foreman

    Abstract: Our Critical Infrastructure (CI) systems are, by definition, critical to the safe and proper functioning of society. Nearly all of these systems utilize industrial Process Control Systems (PCS) to provide clean water, reliable electricity, critical manufacturing, and many other services within our communities - yet most of these PCS incorporate very little cyber-security countermeasures. Cyber-att… ▽ More

    Submitted 23 July, 2016; originally announced July 2016.

    Journal ref: Strategic Cyber Defense: A Multidisciplinary Perspective 48 (2017): 19

  3. arXiv:1607.06377  [pdf, other

    cs.CR

    Aggregation Architecture for Data Reduction and Privacy in Advanced Metering Infrastructure

    Authors: James Christopher Foreman, Franklin Pacheco

    Abstract: Advanced Metering Infrastructure (AMI) have rapidly become a topic of international interest as governments have sponsored their deployment for the purposes of utility service reliability and efficiency, e.g., water and electricity conservation. Two problems plague such deployments. First is the protection of consumer privacy. Second is the problem of huge amounts of data from such deployments. A… ▽ More

    Submitted 19 July, 2016; originally announced July 2016.

    Journal ref: Innovative Smart Grid Technologies Conference-Latin America (ISGT Latin America), 2017 IEEE PES

  4. New Software Metrics for Evaluation and Comparison of Advanced Power Management Systems

    Authors: James Christopher Foreman, Rammohan K. Ragade, James H. Graham

    Abstract: A set of software metrics for the evaluation of power management systems (PMSs) is presented. Such systems for managing power need to be autonomous, scalable, low in complexity, and comprised of portable algorithms in order to be well applied across the varying implementations that utilize power systems. Although similar metrics exist for software in general, their definitions do not readily lend… ▽ More

    Submitted 16 July, 2016; originally announced July 2016.

    Journal ref: IEEE Systems Journal 3.3 (2009): 331-335

  5. arXiv:1607.04811  [pdf

    cs.CR

    Cyber Attack Surface Analysis of Advanced Metering Infrastructure

    Authors: James Christopher Foreman, Dheeraj Gurugubelli

    Abstract: Cyber attacks on critical infrastructure have been an issue of importance in industry over the past several years, as well as a focus of academic research. Cyber attacks of various types and magnitude have been on the rise targeted specifically at power grids. A successful attack on the power grid could result in significant impacts including grid shutdown, cascading failures, damage to the infras… ▽ More

    Submitted 16 July, 2016; originally announced July 2016.

    Journal ref: The Electricity Journal 28.1 (2015): 94-103