Mike Burmester - Publications


Publications --a selection


Cyber-Physical Systems, Critical Infrastructures

  1. Malamas, Vangelis, George Palaiologos, Panayiotis Kotzanikolaou, Mike Burmester, and Dimitris Glynos. "Janus: Hierarchical Multi-Blockchain-Based Access Control (HMBAC) for Multi-Authority and Multi-Domain Environments." Applied Sciences 13, no. 1 (2022): 566.

  2. Munilla, Jorge, Mike Burmester, a nd Raquel Barco. "An enhanced symmetric-key based 5G-AKA protocol.” Computer Networks 198 (2021): 108373.

  3. Ho, Shuyuan Mary, and Mike Burmester. "Cyber Forensics on Internet of Things: Slicing and Dicing Raspberry Pi." International Journal of Cyber Forensics and Advanced Threat Investigations” 2, no. 1 (2021): 29-49.

  4. Gil-Montoya, Francisco, Julio Ortega, Mike Burmester, and Miguel Damas. "Energy-Time Profiling for Machine Learning Methods to EEG Classification." In Bioengineering and Biomedical Signal and Image Processing: First International Conference, BIOMESIP 2021, Meloneras, Gran Canaria, Spain, July 19- 21, 2021, Proceedings, vol. 12940, p. 311. Springer Nature, 2021.

  5. Goble, William, Elizabeth Braddy, Mike Burmester, Daniel Schwartz, Ryan Sloan, Demetra Drizis, Nitish Ahir, Melissa Ma, Matt Bays, and Matt Chastain. "Challenges of securing and defending unmanned aerial vehicles." In National Cyber Summit (NCS) Research Track 2020, pp. 119-138. Springer International Publishing, 2021.

  6. Munilla, Jorge, Adel Hassan, and Mike Burmester. “5G-compliant authentication for RFID”. In Electronics 9, no.11 (2020): 1951

  7. Malamas, Vangelis, Panayiotis Kotzanikolaou, Thomas K. Dasaklis, and Mike Burmester. "A hierarchical multi blockchain for fine grained access to medical data." IEEE Access 8 (2020): 134393-134412.

  8. Alcaraz, Cristina, Mike Burmester, Jorge Cuellar, Xinyi Huang, Panayiotis Kotzanikolaou, and Mihalis Psarakis. "Guest Editorial Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures." IEEE Internet of Things Journal 6, no. 5 (2019): 7988-7991.

  9. Malamas, Vaggelis, Thomas Dasaklis, Panayiotis Kotzanikolaou, Mike Burmester, and Sokratis Katsikas. "A forensics-by-design management framework for medical devices based on blockchain." In 2019 IEEE world congress on services (SERVICES), vol. 2642, pp. 35-40. IEEE, 2019.

  10. Burmester, Mike, and Jorge Munilla. "Lightweight Stream Authentication for Mobile Objects."

    In Advances in Core Computer Science-Based Technologies, pp. 263-275. Cham: Springer International Publishing, 2020.

  11. Jonathan Jenkins, Sean Easton, David Guidry, Mike Burmester, Xiuwen Liu, Xin Yuan, Joshua Lawrence, and Sereyvathana Ty. Trusted Group Key Management For Real-Time Critical Infrastructure Protection. IEEE Military and Commercial Communications Conference (MILCOM), November 2013, San Diego. Early draft (pdf version).

  12. Mike Burmester, Emmanouil Magkos, Vassilis Chrissikopoulos, T-ABAC: An Attribute-Based Access Control Model for

    Real-Time Availability in Highly Dynamic Systems, IEEE Symposium on Computers and Communications (ISCC), July 2013, Split, Croatia. Early draft (pdf version).

  13. Mike Burmester. A Trusted Computing Architecture for Critical Infrastructure Protection. Fourth International Conference on Information, Intelligence, Systems and Applications, IISA 2013, Piraeus, Greece, July 2013. Early draft (pdf version).

  14. Mike Burmester. An Architecture for Trusted Clouds. DIMACS/BIC/A4Cloud/CSA International Workshop on Trustworthiness, Accountability and Forensics in Cloud (TAFC), June 2013, Málaga, Spain, Early draft (pdf version). Critical Infrastructure Panel (photo). Final Workshop Report (link). (pdf version).

  15. Jonathan Jenkins, Mike Burmester. Protecting infrastructure assets from real-time and run-time threats. Chapter 6, Critical Infrastructure Protection VII, 2013, Springer. Early draft (pdf version).

  16. Mike Burmester, Joshua Laurence, David Guidry, Sean Easton, Sereyvathana Ty, Xiuwen Liu, Xin Yan, and Jonathan Jenkins. Towards a Secure Electricity Grid. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP (2013). Melbourne, Australia. Early draft. (pdf version)

  17. David Guidry, Mike Burmester, Xin Yuan, Xiuwen Liu, Jonathan Jenkins, and Sen Easton. Techniques for Securing Substation Automation Systems. In 7th International Workshop on Critical Information Infrastructures Security, CRITIS (2012). Lillehammer, Norway. Early draft. (pdf version)

  18. Mike Burmester, Emmanouil Magkos, and Vassilis Chrissikopoulos. Modeling security in cyber physical systems. Int. J.

    Critical Infrastructure Protection, Elsevier, 5(3-4), 118-126 (2012). Early draft. (pdf version)

  19. Mike Burmester, Emmanouil Magkos, and Vassilis Chrissikopoulos. Secure and Privacy-preserving, Timed Vehicular Communication. Int. J. Ad Hoc and Ubiquitous Computing, Inderscience, 10(4), 219- 229 (2012) Early draft. (pdf version)


pubs_sait1.html[3/7/2024 11:48:16 AM]