Journal Papers

Antoine Lemay, Jose Fernandez, Scott Knight, Intelligence Preparation of the Cyber Environment (IPCE): Finding the High Ground in Cyberspace, Journal of Information Warfare, Volume 13, Issue 3, Aug 2014

Clark, J., Leblanc, S., Knight, S., Compromise Through USB-Based Hardware Trojan Horse Device, Future Generation Computer Systems, Elsevier, Vol. 27, Issue 5, Elsevier, May 2011.

Smith, R., Knight, S., Predictable 3-Parameter Design of Network Covert Communication Systems, IEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, IEEE, Mar 2011.

Scott Knight, Scott Buffett and Patrick C. K. Hung editors, International Journal of Information Security, Volume 6, Number 5, Springer Berlin / Heidelberg, September, 2007

Smith, R., Knight. G.S., “Applying Electronic Warfare Solutions to Network Security”, Canadian Military Journal, Vol. 6, No. 3, RMC, Kingston, Autumn 2005. [.doc]

Book Chapters

Antoine Lemay, Scott Knight, José M. Fernandez, Preparation of the Cyber Environment (IPCE): Finding the High Ground in Cyberspace, Leading issues in i-Warfare vol. 2, Edited by Julie Ryan, pp. 139-156, 2015
(reprint of the conference paper)

Knight, G.S., War by Computer: Canadian Cyber Forces in 2025, editor Granatstein, J.L., The Canadian Forces in 2025 Prospects and Problems, FriesenPress, Feb 2013.

Leblanc,Sylvain P., Knight, G. Scott,"Information Operations in Support of Special Operations", accepted for publication as a chapter in Last, David, Bernd Horn, ed., Choosing Force? Special Operations for Canada, Dec 2004 [.doc]

Conference Proceedings:

Lemay, A., Knight, S., A timing-based covert channel for SCADA networks, 2017 International Conference on Cyber Conflict (CyCon U.S.), Washington D.C., 7-8 Nov 2017.

A. Lemay, S. Leblanc, S. Knight, J. Fernandez, Affecting Freedom of Action in Cyber Space: Subtle Effects and Skilled Operators, 12th International Conference on Cyber Warfare and Security (ICCWS), Dayton, OH, 220-226, 2-3 March 2017.

Lemay, A., Knight, S., Fernandez, J., Leblanc, S., The Sound a Rattling Cyber-Sabre Makes, European Conference on Cyber Warfare and Security 2016 (ECCWS ), Munich, July 2016.

Elliot, A., Knight, S., Start Here: Engineering Scalable Access Control Systems, ACM Symposium on Access Control Models and Technologies 2016 (SACMAT), Shanghai, June 2016.

Lemay, A., Knight, S., Fernandez, J., A Modbus command and control channel, Annual IEEE Systems Conference (SysCon 2016), Orlando, Apr 2016

Elliot, A., Knight, S.,
Towards Managed Role Explosion, New Security Paradigms Workshop (NSPW 2015), Twente, The Netherlands, Sept 2015.

A Lemay, M Krotofil, JM Fernandez, S Knight, Not all SCADA is Equal: Impact of Control Models on ICS Threat Landscape, Proceedings of the 2nd International Symposium on ICS & SCADA Cyber Security Research, Sept 2014.

Chris Chapman, Scott Knight, Tom Dean, USBcat – Towards an Intrusion Surveillance Toolset, Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention (AIDP 2014), Marrakesh, Morocco, June 2014.

Antoine Lemay, Jose Fernandez, Scott Knight. Modelling Physical Impact of Cyber Attacks. 2014 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES 2014), Berlin, April 2014.

Antoine Lemay, Scott Knight, Jose Manuel Fernandez. Intelligence Preparation of the Cyber Environment (IPCE): Finding The High Ground In Cyberspace. 9th International Conference on Cyber Warfare and Security (ICCWS 2014), Purdue University, West Lafayette, USA, March  2014.

Antoine Lemay,José M. Fernandez,and Scott Knight, An Isolated Virtual Cluster for SCADA Network Security, 1st International Symposium for ICS & SCADA Cyber Security, Leicester, Sep 2013.

Jason S. Alexander, Thomas R. Dean and Scott Knight, Spy vs. Spy: Counter-intelligence Methods for Backtracking Malicious Intrusions, CASCON 2011, Toronto, Nov ‘11.

Clark, J., Leblanc, S., Knight, S., Risks Associated with USB Hardware Trojan Devices Used by Insiders, SysCon 2011 : IEEE International Systems Conference, Montreal, Apr 2011.

Elliott, A., Knight, S., Role Explosion: Acknowledging the Problem, WORLDCOMP ’10, Las Vegas, Jul 2010. [PDF]

Lemay, A., Fernandez, J., Knight, S., Pinprick attacks, a lesser included case?, Conference on Cyber Conflict Proceedings 2010, CCD COE  Publications, Tallinn, Estonia, Jun 2010.

Forest, K., Knight, S., Permutation-based Steganographic Channels, International Conference on Risks and Security of Internet and Systems (CRISIS) ’09, Toulouse, France, Oct 2009 [.doc]

Clark, J., Leblanc, S., Knight, S., Hardware Trojan Horse Device based on Unintended USB Channels, 3rd International Conference on Network & System Security – NSS ’09, Gold Coast, Australia, Oct 2009. [PDF]

Elliot, A., Knight, S., One Employee and Several Applications: An Information Management Case Study, WORLDCOMP ’09, Las Vegas, Jul 2009. [PDF]

Knight, S., Leblanc, S., When Not to Pull the Plug – The Need for Network Counter-Surveillance Operations, CCDCoE Conference on Cyber Warfare, Tallinn, Estonia, Jun 2009. [.doc]

Dan Lynch, Maria A. Gorlatova, Scott Knight, Yannick Lacharité, Louise Lamont, Peter C. Mason, Providing Effective Security in Mobile Ad Hoc Networks Without Affecting Bandwidth or Interoperability, Army Science Conference, Orlando, Florida, December 1-4, 2008.   [PDF]

Smith, R.W., Knight, G.S., Predictable Design of Network-Based Covert Communication Systems, In Proc IEEE Symposium on Security and Privacy, Oakland, California, May 2008. 


S. Zhang, T.R. Dean, G.S. Knight,  Lightweight State Based Mutation Testing for Security, Proc TAICPART-MUTATION 2007 , Windsor, UK, September 2007.

Songtao Zhang , T.R. Dean and S. Knight, "A Lightweight Approach To State Based Security Testing", Proc. CASCON 06, 16th IBM Centre for Advanced Studies Conference, Toronto, Canada, October 2006, 4 pp.  [PDF]

Sylvain Marquis, T.R. Dean and S. Knight, "Packet Decoding using Context Sensitive Parsing", Proc. CASCON 06, 16th IBM Centre for Advanced Studies Conference, Toronto, Canada, October 2006, 11 pp.  [PDF]

Marquis, S., Dean, T., Knight, S. “SCL: A Language for Security Testing of Network Applications”, CASCON ’05 (IBM Centers for Advanced Studies Conference), Toronto, Oct 2005. [PDF]

Daicos, C., Knight, S., “A Passive External Web Surveillance Technique for Private Networks”, Mathematical Methods, Models and Architectures for Computer Networks Security, St Petersburg, Russia, Sep 2005. [PDF]

Leblanc, S.P., Knight, G.S., “
Engaging the Adversary as a Viable Response to Network Intrusion”, Workshop on Cyber Infrastructure Emergency Preparedness Aspects, Ottawa, 21-22 Apr 2005. [.doc]

Dean, T., Knight, S., "Applying Software Transformation Techniques to Security Testing", 1st International Workshop on Software Evolution Transformations, Delft, the Netherlands, Nov 2004 [PDF]

Tal, O., Knight, S., Dean, T., “Syntax-based Vulnerability Testing of Frame-based Network Protocols”, accepted for publication Privacy, Security and Trust 2004 Fredericton, N.B., 13-15 Oct 2004 [PDF]

Turcotte, Y., Tal, O., Knight S., “Security Vulnerabilities Assessment of the X.509 Protocol by Syntax-Based Testing”, accepted for publication MILCOM 2004, Monteray, CA. Oct 30-Nov 3 2004 [PDF]

Hennessy, Michael A., Knight, G. Scott, "Cyberterrorism: Calibrating Hype to the ‘New Normal’", Canada and the New Security Agenda, Queen's Centre for International Relations (QCIR), 5-6 June 2003

Knight, G.S., Carosielli, "Detecting Malicious Use With Unlabelled Data Using Clustering and Outlier Analysis", IFIP TC11 18th International Conference on Information Security, Athens, May 2003 [PDF]

Daicos, C., Knight, G.S., "Concerning Enterprise Network Vulnerability To Http Tunnelling", IFIP TC11 18th International Conference on Information Security, Athens, May 2003 [PDF]

Knight, G.S., Grandy, C., "Scalability Issues in PMI Delegation", 1st Annual PKI Research Workshop, NIST, Gaithersburg, Apr. 2002 [PDF]

Knight, G.S., Crocker, M.R., "Redesign of a Distributed Vulnerability Scanning Tool to Use an Abstract Vendor-Independent PKI Interface", Annual Canadian Information Technology Security Symposium, Communications Security Establishment, Ottawa, May 2002 [PDF]

DePlanché, D.E., Knight, G.S. and Rahman, M.H., "Public Key Infrastructure Installation On The Defence Wide Area Network", IEEE Canadian Conference on Electrical and Computer Engineering, Halifax, May 2000

Knight G.S., Ball, B., Meijer, H. and Pickering, D., "@TEC - Advanced Technology Education Consortium", Canadian Conference on Computer Engineering Education, Vancouver, Jun. 1999

Bouchard, D.E., Knight G.S. and Chikhani A.Y., "Representing Power Distribution Systems Using Objects and Patterns", IEEE Canadian Conference on Electrical and Computer Engineering, Waterloo, May 1998

Shepard, T. and Knight, S., "Fault Tolerance for Real-Time Multiprocessor Operarting Systems", IEEE Canadian Conference on Electrical and Computer Engineering, Quebec, Sep 1991