scispace - formally typeset
T

Thomas Morris

Researcher at University of Alabama in Huntsville

Publications -  87
Citations -  3264

Thomas Morris is an academic researcher from University of Alabama in Huntsville. The author has contributed to research in topics: SCADA & Intrusion detection system. The author has an hindex of 25, co-authored 82 publications receiving 2380 citations. Previous affiliations of Thomas Morris include Mississippi State University & Bath Spa University.

Papers
More filters
Journal ArticleDOI

Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems

TL;DR: A systematic and automated approach to build a hybrid IDS that learns temporal state-based specifications for power system scenarios including disturbances, normal control operations, and cyber-attacks is presented.
Proceedings ArticleDOI

Machine learning for power system disturbance and cyber-attack discrimination

TL;DR: This work explores the viability of machine learning as a means for discriminating types of power system disturbances, and focuses specifically on detecting cyber-attacks where deception is a core tenet of the event.
Journal ArticleDOI

Experiential learning – a systematic review and revision of Kolb’s model

TL;DR: A revision to Kolb’s model is proposed: experiential learning consists of contextually rich concrete experience, critical reflective observation, contextual-specific abstract conceptualization, and pragmatic active experimentation.
Proceedings ArticleDOI

On SCADA control system command and response injection and intrusion detection

TL;DR: A set of command injection, data injection, and denial of service attacks which leverage the lack of authentication in many common control system communication protocols including MODBUS, DNP3, and EtherNET/IP are developed.
Journal ArticleDOI

A control system testbed to validate critical infrastructure protection concepts

TL;DR: The testbed enables a research process in which cybersecurity vulnerabilities are discovered, exploits are used to understand the implications of the vulnerability on controlled physical processes, identified problems are classified by criticality and similarities in type and effect, and finally cybersecurity mitigations are developed and validated against within the testbed.