Scott Knight,
Sylvain Leblanc, Erich Devendorf, Mike Shuck, Design It, Build It,
Defend It– Using Cyber Exercises in the Education of Cyber Forces,
National Cyber Emergencies: The Return of Civil
DefencePublisher editor Greg Austin, Routledge, Jan 2020.
(reprint of the conference paper)
J. Timmins, S.
Knight and B. Lachine, Offensive Cyber Security Trainer for
Platform Management Systems, 2021 IEEE International Systems
Conference (SysCon), 2021, pp. 1-8, doi:
10.1109/SysCon48628.2021.9447060.
Scott Knight,
Sylvain Leblanc, Erich Devendorf, Mike Shuck, Design It, Build It,
Defend It– Using Cyber Exercises in the Education of Cyber Forces,
Cyber Storm International Conference, Canberra, Australia,
February 2019.
A. Elliott and S.
Knight, ORGODEX: Service Portfolios for the Cloud, IEEE CLOUD 2018
Work in Progress Papers, San Francisco, CA, July 2018.
A. Elliott and S.
Knight, ORGODEX: Authorization as a service (AaaS), 2018 Annual
IEEE International Systems Conference (SysCon), Vancouver, BC,
April 2018, pp. 1-8.
D. McGaughey, T. Semeniuk, R. Smith and S. Knight, A systematic
approach of feature selection for encrypted network traffic
classification, 2018 Annual IEEE International Systems Conference
(SysCon), Vancouver, BC, April 2018, pp. 1-8.
Lemay, A., Knight,
S., A timing-based covert channel for SCADA networks, 2017
International Conference on Cyber Conflict (CyCon U.S.),
Washington D.C., 7-8 Nov 2017.
A. Lemay, S.
Leblanc, S. Knight, J. Fernandez, Affecting Freedom of Action in
Cyber Space: Subtle Effects and Skilled Operators, 12th
International Conference on Cyber Warfare and Security (ICCWS),
Dayton, OH, 220-226, 2-3 March 2017.
Lemay, A., Knight,
S., Fernandez, J., Leblanc, S., The Sound a Rattling Cyber-Sabre
Makes, European Conference on Cyber Warfare and Security 2016
(ECCWS ), Munich, July 2016.
Elliot, A., Knight, S., Start Here: Engineering Scalable Access
Control Systems, ACM Symposium on Access Control Models and
Technologies 2016 (SACMAT), Shanghai, June 2016.
Lemay, A., Knight, S., Fernandez, J., A Modbus command and control
channel, Annual IEEE Systems Conference (SysCon 2016), Orlando,
Apr 2016
Elliot, A., Knight, S., Towards Managed Role Explosion, New
Security Paradigms Workshop (NSPW 2015), Twente, The Netherlands,
Sept 2015.
A Lemay, M Krotofil, JM Fernandez, S Knight, Not all SCADA is
Equal: Impact of Control Models on ICS Threat Landscape,
Proceedings of the 2nd International Symposium on ICS & SCADA
Cyber Security Research, Sept 2014.
Chris Chapman, Scott Knight, Tom Dean, USBcat – Towards an
Intrusion Surveillance Toolset, Proceedings 2014 International
Workshop on Advanced Intrusion Detection and Prevention (AIDP
2014), Marrakesh, Morocco, June 2014.
Antoine Lemay, Jose Fernandez, Scott Knight. Modelling Physical
Impact of Cyber Attacks. 2014 Workshop on Modeling and Simulation
of Cyber-Physical Energy Systems (MSCPES 2014), Berlin, April
2014.
Antoine Lemay, Scott Knight, Jose Manuel Fernandez. Intelligence
Preparation of the Cyber Environment (IPCE): Finding The High
Ground In Cyberspace. 9th International Conference on Cyber
Warfare and Security (ICCWS 2014), Purdue University, West
Lafayette, USA, March 2014.
Antoine Lemay,José M. Fernandez,and Scott Knight, An Isolated
Virtual Cluster for SCADA Network Security, 1st International
Symposium for ICS & SCADA Cyber Security, Leicester, Sep 2013.
Jason S. Alexander, Thomas R. Dean and Scott Knight, Spy vs. Spy:
Counter-intelligence Methods for Backtracking Malicious
Intrusions, CASCON 2011, Toronto, Nov ‘11.
Clark, J., Leblanc, S., Knight, S., Risks Associated with USB
Hardware Trojan Devices Used by Insiders, SysCon 2011 : IEEE
International Systems Conference, Montreal, Apr 2011.
Elliott, A., Knight, S., Role Explosion: Acknowledging the
Problem, WORLDCOMP ’10, Las Vegas, Jul 2010. [
PDF]
Lemay, A., Fernandez, J., Knight, S., Pinprick attacks, a lesser
included case?, Conference on Cyber Conflict Proceedings
2010, CCD COE Publications, Tallinn, Estonia, Jun 2010.
Forest, K., Knight, S., Permutation-based Steganographic Channels,
International Conference on Risks and Security of Internet and
Systems (CRISIS) ’09, Toulouse, France, Oct 2009 [
.doc]
Clark, J., Leblanc, S., Knight, S., Hardware Trojan Horse Device
based on Unintended USB Channels, 3rd International Conference on
Network & System Security – NSS ’09, Gold Coast, Australia,
Oct 2009. [
PDF]
Elliot, A., Knight, S., One Employee and Several Applications: An
Information Management Case Study, WORLDCOMP ’09, Las Vegas, Jul
2009. [
PDF]
Knight, S., Leblanc, S., When Not to Pull the Plug – The Need for
Network Counter-Surveillance Operations, CCDCoE Conference on
Cyber Warfare, Tallinn, Estonia, Jun 2009. [
.doc]
Dan Lynch, Maria A. Gorlatova, Scott Knight, Yannick Lacharité,
Louise Lamont, Peter C. Mason, Providing Effective Security in
Mobile Ad Hoc Networks Without Affecting Bandwidth or
Interoperability, Army Science Conference, Orlando, Florida,
December 1-4, 2008. [
PDF]
Smith, R.W., Knight, G.S., Predictable Design of Network-Based
Covert Communication Systems, In Proc IEEE Symposium on Security
and Privacy, Oakland, California, May 2008. [
PDF]
S. Zhang, T.R. Dean, G.S. Knight, Lightweight State Based
Mutation Testing for Security, Proc TAICPART-MUTATION 2007 ,
Windsor, UK, September 2007.
Songtao Zhang , T.R. Dean and S. Knight, "A Lightweight Approach
To State Based Security Testing", Proc. CASCON 06, 16th IBM Centre
for Advanced Studies Conference, Toronto, Canada, October 2006, 4
pp. [
PDF]
Sylvain Marquis, T.R. Dean and S. Knight, "Packet Decoding using
Context Sensitive Parsing", Proc. CASCON 06, 16th IBM Centre for
Advanced Studies Conference, Toronto, Canada, October 2006, 11
pp. [
PDF]
Marquis, S., Dean, T., Knight, S. “SCL: A Language for Security
Testing of Network Applications”, CASCON ’05 (IBM Centers for
Advanced Studies Conference), Toronto, Oct 2005. [
PDF]
Daicos, C., Knight, S., “A Passive External Web Surveillance
Technique for Private Networks”, Mathematical Methods, Models and
Architectures for Computer Networks Security, St Petersburg,
Russia, Sep 2005. [
PDF]
Leblanc, S.P., Knight, G.S., “Engaging the Adversary as a Viable
Response to Network Intrusion”, Workshop on Cyber Infrastructure
Emergency Preparedness Aspects, Ottawa, 21-22 Apr 2005. [
.doc]
Dean, T., Knight, S., "Applying Software Transformation Techniques
to Security Testing", 1st International Workshop on Software
Evolution Transformations, Delft, the Netherlands, Nov 2004 [
PDF]
Tal, O., Knight, S., Dean, T., “Syntax-based Vulnerability Testing
of Frame-based Network Protocols”, accepted for publication
Privacy, Security and Trust 2004 Fredericton, N.B., 13-15 Oct 2004
[
PDF]
Turcotte, Y., Tal, O., Knight S., “Security Vulnerabilities
Assessment of the X.509 Protocol by Syntax-Based Testing”,
accepted for publication MILCOM 2004, Monteray, CA. Oct 30-Nov 3
2004 [
PDF]
Hennessy, Michael A., Knight, G. Scott, "Cyberterrorism:
Calibrating Hype to the ‘New Normal’", Canada and the New Security
Agenda, Queen's Centre for International Relations (QCIR), 5-6
June 2003
Knight, G.S., Carosielli, "Detecting Malicious Use With Unlabelled
Data Using Clustering and Outlier Analysis", IFIP TC11 18th
International Conference on Information Security, Athens, May 2003
[
PDF]
Daicos, C., Knight, G.S., "Concerning Enterprise Network
Vulnerability To Http Tunnelling", IFIP TC11 18th International
Conference on Information Security, Athens, May 2003 [
PDF]
Knight, G.S., Grandy, C., "Scalability Issues in PMI Delegation",
1st Annual PKI Research Workshop, NIST, Gaithersburg, Apr. 2002 [
PDF]
Knight, G.S., Crocker, M.R., "Redesign of a Distributed
Vulnerability Scanning Tool to Use an Abstract Vendor-Independent
PKI Interface", Annual Canadian Information Technology Security
Symposium, Communications Security Establishment, Ottawa, May 2002
[
PDF]
DePlanché, D.E., Knight, G.S. and Rahman, M.H., "Public Key
Infrastructure Installation On The Defence Wide Area Network",
IEEE Canadian Conference on Electrical and Computer Engineering,
Halifax, May 2000
Knight G.S., Ball, B., Meijer, H. and Pickering, D., "@TEC -
Advanced Technology Education Consortium", Canadian Conference on
Computer Engineering Education, Vancouver, Jun. 1999
Bouchard, D.E., Knight G.S. and Chikhani A.Y., "Representing Power
Distribution Systems Using Objects and Patterns", IEEE Canadian
Conference on Electrical and Computer Engineering, Waterloo, May
1998
Shepard, T. and Knight, S., "Fault Tolerance for Real-Time
Multiprocessor Operarting Systems", IEEE Canadian Conference on
Electrical and Computer Engineering, Quebec, Sep 1991