Thomas H. (Tommy) Morris, Ph.D.
Director, Eminent Scholar, and Professor
Center for Cybersecurity Research and Engineering (CCRE)
Eminent Scholars Foundation King-McDonald Endowed Chair
Electrical and Computer Engineering (ECE)
The University of Alabama in Huntsville
Education
Ph.D. Computer Engineering
Southern Methodist University
Dallas, TX, 2008
M.S. Computer Engineering
Southern Methodist University
Dallas, TX, 2001
B.S. Electrical Engineering
Texas A&M University
College Station, TX, 1994
Background
I joined UAH as the founding director of the Center for Cybersecurity Research and Education in 2015. The center has grown to employ more that 40 full time staff and close to 100 students. The center conducts research and development, education and training, and workforce development to aid government and industry locally and nationally. I also serve as a Professor and Eminent Scholar in the Department of Electrical and Computer Engineering. As a faculty member I was instrumental in creation of the UAH B.S. in Cybersecurity Engineering program. I am the Principal Investigator (P.I.) of the UAH CyberCorps: Scholarship for Service grant and D.O.D. Cybersecurity Scholarship Program. I also serve as P.I. of many completed and active grants at UAH. Before joining the University of Alabama in Huntsville I worked at Mississippi State University from 2008-2015 and Texas Instruments from 1991-2008. At MSU, I served as an associate professor and center director. At TI, I worked as a digital designer and digital design verification engineer.
My hobbies include running, caving, and homebrewing. I am married with two grown sons.
Teaching
I currently teach or have recently taught the following courses.
CPE 459/559 - Systems Security
CPE 212 - Fundamentals of Software Engineering
CPE 449/549 - Introduction to Cybersecurity Engineering
CPE 426/526 - VLSI Hardware Design Languages, Models, and Simulation
CPE 692 - Cybersecurity Capstone
ENG 101 - Introduction to Computing for Engineers
INSuRE: Cybersecurity Research Experience
Digital Systems Design
Industrial Control System Security
Cyber Physical Systems Security
Data Communications & Computer Networking
Research
My primary research area is computer security. My current research involves security for Industrial Control Systems and other Cyber Physical Systems (CPS). Together with a group of student researchers, I am investigate modeling and simulation of CPS systems for cybersecurity research. We primarily examine vulnerabilities, security controls, and methods for event detection..
We have created a set of cyber attack datasets for industrial control systems.
Check out our virtual control systems research.
Click here to learn how to install OpenPLC as a virtual machine.
Journal
S. Puckett, J. Liu, S. -M. Yoo and T. Morris, "A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators," in IEEE Internet of Things Journal, August 2023, doi: 10.1109/JIOT.2023.3304175.
Werth, A., Morris, T., A digital twin internal to a PLC to detect malicious commands and ladder logic that potentially cause safety violations. Journal of Cyber Security Technology, February 2023, http://dx.doi.org/10.1080/23742917.2023.2171538
Werth, A., Morris, T., Intrusion prevention for payloads against cyber-physical systems by predicting potential impacts., Journal of Cyber Security Technology, 6(6):1-36, June 2021, http://dx.doi.org/10.1080/23742917.2022.2088113
Werth, A., Griffth, S., Hairston, J., Morris, T., Cybersecurity threats and experimental testbed for a generator system. The Journal of Defense Modeling & Simulation 19(1):154851292096053, October 2020, DOI: 10.1177/1548512920960537
Alves, T., Morris, T., OpenPLC: An IEC 61131-3 Compliant Open Source Industrial Controller for Cyber Security Research, Volume 78, September 2018, Pages 364-379, https://doi.org/10.1016/j.cose.2018.07.007. link
Alves, T., Das, R., Werth, A., Morris, T., Virtualization of SCADA Testbeds for Cybersecurity Research: A Modular Approach, in Computers & Security, Volume 77, August 2018, Pages 531-546, https://doi.org/10.1016/j.cose.2018.05.002. link
Alves, T., Das, R., Morris, T., Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controller, in IEEE Embedded Systems Letters, vol. 10, no. 3, pp. 99-102, Sept. 2018, doi: 10.1109/LES.2018.2823906. link
Sherman, A., Dark, M., Chan, A., Chong, R., Morris, T., Olivia, L., Springer, J., Thuraisingham, B., Vatcher, C., Verma, R., Wetzel, S., INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research, in IEEE Security & Privacy, vol. 15, no. 4, pp. 72-78, 2017. link
Adhikari, U., Morris, T., Pan, S., Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event and Intrusion Classification, IEEE Transactions on Smart Grid, doi: 10.1109/TSG.2017.2647778, link
Adhikari, U., Morris, T., Pan, S., Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection, IEEE Transactions on Smart Grid, doi: 10.1109/TSG.2016.2642787, link
Chen, Q., Trivedi, M., Abdelwahed, S., Morris, T., Sheldon, F. Model-based Autonomic Security Management for Cyber Physical Infrastructures. International Journal of Critical Infrastructures, Inderscience Publishers Ltd., vol. 12, no. 4, pp. 273-294, 2016, doi: 10.1504/IJCIS.2016.10002316, link
Adhikari, U., Morris, T., Pan, S., WAMS Cyber-Physical Test Bed for Power System, Cybersecurity Study, and Data Mining. IEEE Transactions on Smart Grid. vol. 8, no. 6, pp. 2744-2753, 2017, doi: 10.1109/TSG.2016.2537210, link
Morris, T., Pan, S., Adhikari, U., Younan, N., King, R. and Madani, V. (2016) ‘Cyber security testing and intrusion detection for synchrophasor systems’, International Journal of Network Science, Vol. 1, No. 1, pp.28–52. link
S. Pan, T. Morris and U. Adhikari, "Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems," in IEEE Transactions on Smart Grid, vol. 6, no. 6, pp. 3104-3113, Nov. 2015. doi: 10.1109/TSG.2015.2409775 link
S. Pan, T. Morris and U. Adhikari, "Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data," in IEEE Transactions on Industrial Informatics, vol. 11, no. 3, pp. 650-662, June 2015. doi: 10.1109/TII.2015.2420951 link
Pan, S., Morris, T., Adhikari, U., A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System, International Journal of Network Security (IJNS), Vol.17, No.2, PP.174-188, March 2015. pdf
Gao, W., Morris, T.,On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems. The Journal for Digital Forensics, Security and Law (JDFSL). Volume 9, No. 1. 2014. link
Srivastava, A., Morris, T., Ernster, T., Vellaithurai, C., Pan, S., Adhikari, U. Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information. IEEE Transactions on Smart Grid. Volume 4, No.1, pp.235-244, March 2013. doi: 10.1109/TSG.2012.2232318 link
Abu-Nimeh, S., Foo, E., Fovino, I.N., Govindarasu, M., Morris, T., "Cyber security of networked critical infrastructures [Guest Editorial]," IEEE Network, vol.27, no.1, pp.3-4, January-February 2013 link
Reaves, B., Morris, T. Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems. International Journal of Critical Infrastructure Protection (IJCIP). Elseiver. Volume 5. Issues 3-4. December 2012. Pages 154–174 link
Reaves, B., Morris, T. An Open Virtual Testbed for Industrial Control System Security Research. International Journal of Information Security (IJIS). Springer. Volume 11, Issue 4 (2012), Page 215-229. DOI: 10.1007/s10207-012-0164-7 link
Morris, T. Srivastava, A., Reaves, B., Gao, W., Pavurapu, K., Reddi, R. A Control System Testbed to Validate Critical Infrastructure Protection Concepts. International Journal of Critical Infrastructure Protection (2011). Elseiver. doi:10.1016/j.ijcip.2011.06.005 link
Morris, T., Nair, V.S.S. Private Computing on Public Platforms: Portable Application Security. In Wiley InterScience Journal of Wireless Communications and Mobile Computing. Volume 10, Issue 7. Pages 942-958. John Wiley & Sons, Ltd. July 2010. link
Morris, T. Nair, V.S.S. Key Protection for Private Computing on Public Platforms. International Journal of Computer Science and Security (IJCSS). Volume 3, Issue 5. Pages 371-383. CSC Journals. November 2009. pdf
Books
Choo, K. R., Morris, T., Petersen, G., Imsand, E., National Cyber Summit (NCS) Research Track 2021, Lecture Notes in Networks and Systems (LNNS, volume 310), August 2021, https://doi.org/10.1007/978-3-030-84614-5
Choo, K. R., Morris, T., Petersen, G., National Cyber Summit (NCS) Research Track 2020, Advances in Intelligent Systems and Computing, January 2020, http://dx.doi.org/10.1007/978-3-030-58703-1, ISBN: 978-3-030-58702-4
Choo, K. R., Morris, T., Petersen, G., National Cyber Summit (NCS) Research Track, Advances in Intelligent Systems and Computing, June 2019, http://dx.doi.org/10.1007/978-3-030-31239-8, ISBN: 978-3-030-31238-1
Book Chapters
Alim, M.E., Smalligan, J., Oliveira, R.F.B., Griffith, S.A., Morris, T.H. (2021). Cyber-Physical System. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1492-1
Griffith, S., Morris, T.H. (2021). Supervisory Control and Data Acquisition. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1490-1
Williams, T., El-Gayar, O., Morris, T.H. (2021). Security Analytics. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1494-1
Hairston, J.R., Gaede, R., Morris, T.H. (2021). Industrial Internet of Things. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1493-1
Das, R. Morris, T., "Modeling a Midstream Oil Terminal for Cybersecurity Risk Evaluation," in Critical Instructure Protection XII, Sujeet Shenoi and Jason Staggs, Eds. IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, 2018.
Thornton, Z., Morris, T., "Enhancing a Virtual SCADA Cyber Security Laboratory Using Simulink," in Critical Infrastructure Protection IX, Sujeet Shenoi and Johnathan Butts, Eds. IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, 2015. link
Morris, T., Gao, W., "Industrial Control System Network Traffic Data sets to Facilitate Intrusion Detection System Research," in Critical Infrastructure Protection VIII, Sujeet Shenoi and Johnathan Butts, Eds. IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, Volume 441, 2014, pp 65-78. link
Morris, T., "Trusted Platform Module," in Encyclopedia of Cryptography and Security, H. C. A. van Tilborg and S. Jajodia, Eds. Boston, MA: Springer US, 2011, ch. 796, pp. 1332-1335. link
Giri, J., Morris, T., "Transmission Systems," in Smart Grids: infrastructure, Technology, and Solutions, Stuart Borlase, Ed., Boca Raton, FL: CRC Press, Taylor and Francis Group, 2012, Chapter 3.4.1, pp. 156-168. link
Morris, T., Pan, S., Adhikari, U., Younan, N., King, R., Madani, V., "Phasor Measurement Unit and Phasor Data Concentrator Cyber Security" in Systems and Optimization Aspects of Smart Grid Challenges, Carvalho, M., Pappu, V., Pardalos, P., Eds., Springer-Verlag Berlin Heidelberg, 2013, Chapter 7. link
Reports
Pulivarti R.; Martin N.; Byers F.; Wagner J.; Zook J.; Maragh S.; McDaniel J.; Wilson K.; Wojtyniak M.; Kreider B.; France A.; Edwards S.; Morris T.; Sheldon J.; Ross S.; Whitlow P., NIST Internal Report 8432 Cybersecurity of Genomic Data, NIST_PUBS, 12/20/2023, https://doi.org/10.6028/NIST.IR.8432
Conference
Sheldon, J., Ross, S., Morris, T., Brown, I., Zhu, F., Pape, P., and Whitlow, P. 2024. Genomics Cybersecurity Concerns, Challenges, and a Modular Test Lab. In Proceedings of the 2024 ACM Southeast Conference (ACM SE '24). Association for Computing Machinery, New York, NY, USA, 86–94. https://doi.org/10.1145/3603287.3651215
Liu, J., Dong, S., Morris, T., and Fang, Y., Social Equality-Aware Resource Allocation for Post-Disaster Communication Restoration, The 32nd International Conference on Computer Communications and Networks (ICCCN 2023), July 24 -26, 2023, Honolulu, HI, USA.
Wright, S., Mehaan, W., Morris, T., A Generic Missile Defense System Model for Use in Cybersecurity Vulnerability Assessments, Interservice/Industry Training, Simulation and Education Conference (I/ITSEC), Nov 27 - Dec 1, 2023. https://www.xcdsystem.com/iitsec/proceedings/index.cfm?Year=2023&AbID=121280&CID=1001.
Murbach, K., Morris, T. Wiersig, F., and Golden, J., "Small Satellite System Modeling for Vulnerability Analysis," 2023 IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, 2023, pp. 373-380, doi: 10.1109/CSR57506.2023.10224948.
Alim, M., Smalligan, J., Morris, T., A Collection of Datasets and Simulation Frameworks for Industrial Control System Research, IEEE SoutheastCon, April 2023. (to appear)
Wright, S., Cannan, L., Morris, T., Development of a High-Speed High-Fidelity SCADA Simulation Framework, IEEE SoutheastCon, April 2023. (to appear)
Alim, M., Wright, S., Morris, T., A Laboratory-Scale Canal SCADA System Testbed for Cybersecurity Research, 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), December 2021, http://dx.doi.org/10.1109/TPSISA52974.2021.00038
Alim, M., Wright, S., Morris, T., A Laboratory-Scale Spillway SCADA System Testbed for Cybersecurity Research, Proceedings of the Industrial Control System Security, December 2021.
Werth, A., Morris, T., Prototyping PLCs and IoT Devices in an HVAC Virtual Testbed to Study Impacts of Cyberattacks. Proceedings of Fifth International Congress on Information and Communication Technology, January 2021, http://dx.doi.org/10.1007/978-981-15-5856-6_62
Werth, A., Morris, T., A Specification-Based Intrusion Prevention System for Malicious Payloads, January 2020, in National Cyber Summit (NCS) Research Track, http://dx.doi.org/10.1007/978-3-030-31239-8_13
Griffith, S., Morris, T., Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems, January 2020, in National Cyber Summit (NCS) Research Track, http://dx.doi.org/10.1007/978-3-030-31239-8_10
Gaede, R., Morris, T. ,Das, R., Lei, Y., Zhou, H., Fahimi, F., Work in Progress: Layering Cybersecurity on Domain Engineering Instruction , 2019 ASEE Annual Conference & Exposition, http://dx.doi.org/10.18260/1-2--33636
Taluker, B., Kerns, J., Ray, B., Morris, T., Rahman, T., Exploiting DRAM Latency Variations for Generating True Random Numbers, Conference: 2019 IEEE International Conference on Consumer Electronics (ICCE), http://dx.doi.org/10.1109/ICCE.2019.8662060
Das, R., Menon, V. and Morris, T., On the Edge Realtime Intrusion Prevention System for DoS Attack. 5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018), Hamburg, Germany, August 29-30, 2018.
Alves, T., Morris, T., Hardware-based Cyber Threats, 4th International Conference on Information Systems Security and Privacy, Funchal-Madeira, Portugal, January 22-24, 2018.
Lingasubramanian, K., Kumar, R., Gunti, N., Morris, T., Study of Hardware Trojans Based Security Vulnerabilities in Cyber Physical Systems, IEEE 36th International Conference on Consumer Electronics, Las Vegas, NV, January 12-15, 2018.
Alves, T., Morris, T., Yoo, S., Securing SCADA Applications Using OpenPLC With End-To-End Encryption. Third Annual Industrial Control System Security (ICSS) Workshop at the 2016 Annual Computer Security Applications Conference. Orlando, Florida, USA, December 4-8, 2017.
Das, R., Morris, T. Machine Learning and Cyber Security, International Conference on Computer, Electrical & Communication Engineering, Kolkata, West Bengal, India, December 22-23, 2017.
Gunti, N., Lingasubramanian, K., Alves, T., Das, R., Morris, T., Virtual Simulation Platform for Studying Hardware Trojan Vulnerabilities in SCADA Systems, Proceedings of the 2017 National Cyber Summit Research Track, Huntsville, AL, June 6-8, 2017.
Alves, T., Das, R. Morris, T. Virtualization of Industrial Control System Testbeds for Cybersecurity. Second Annual Industrial Control System Security (ICSS) Workshop at the 2016 Annual Computer Security Applications Conference. Los Angeles, CA. December 5-9, 2016. link,slides
Vaughn, R., Morris, T., Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation. The 11th Annual Cyber and Information Security Research (CISR) Conference. April 5-7, 2016. Oak Ridge, TN, USA. link
Hu, F., Morris, T., McCallum, D., Zhou, H., Towards a Multimedia-based Virtual Classroom on Cyber-Physical System (CPS) Security Education for Both City and Rural Schools. 2015 ASEE Annual Conference and Exposition. June 14-17, 2015. Seattle, WA, USA. link
Beaver, J., Borges, R., Buckner, M., Morris, T., Adhikari, U., Pan, S., Machine Learning for Power System Disturbance and Cyber-attack Discrimination, Proceedings of the 7th International Symposium on Resilient Control Systems, August 19-21,2014, Denver, CO, USA. link
Adhikari, U., Morris, T., Pan, S. A Cyber-Physical Power System Test Bed for Intrusion Detection Systems. Proceedings of the 2014 IEEE Power Energy Society General Meeting (PESGM). July 27-31, 2014. National Harbor, MD. pdf
Adhikari, U., Morris, T., Pan, S. A Causal Event Graph for Cyber-Power System Events Using Synchrophasor. Proceedings of the 2014 IEEE Power Energy Society General Meeting (PESGM). July 27-31, 2014. National Harbor, MD. pdf
Madani, V., Barich, J., Day, D., Gotesky, J., Jampala, A., Giri, J., Parashar, M., Rahmnatian, F., Gharpure, V., King, R., Morris, T. Advanced EMS Applications Using Synchrophasor Systems for Grid Operation. Proceedings of the 2014 IEEE PES Transmission & Distribution Conference & Exposition. April 14-17, 2014. Chicago, IL. link
Morris, T., Gao, W. Classifications of Industrial Control System Cyber Attacks. Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security 2013. September 16-17, 2013. Leicester, UK. link
Morris, T., Vaughn, R., Sitnikova, E. Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security. Proceedings of the Australasian Information Security Conference (ACSW-AISC) 2013. January 29-February 1, 2013. Adelaide, Australia. pdf
Pan, S., Morris, T., Adhikari, U., Causal Event Graphs Cyber-physical System Intrusion Detection System. Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW8). Jan 8-10, 2013. Oak Ridge, TN. pdf
Sprabery, R., Morris, T., Pan, S., Adhikari, U., Protocol Mutation Intrusion Detection for Synchrophasor Communications. Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW8). Jan 8-10, 2013. Oak Ridge, TN. pdf
Vaughn, R., Morris, T., Sitnikova, E. Development and Expansion of an Industrial Control System Security Laboratory and an International Research Collaboration. Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW8). Jan 8-10, 2013. Oak Ridge, TN. pdf
Sheldon, S., Huang, J., Dang, J., Fetzer, D., Goose, S., Kirsch, J., Manz, D., Morris, T., Wei, D. Intrinsically Resilient Energy Control Systems. Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW8). Jan 8-10, 2013. Oak Ridge, TN. pdf
Sheldon, S., Huang, J., Dang, J., Fetzer, D., Manz, D., Morris, T., Wei, D., Kirsch, J., Goose, S. Using Semantic Web Technologies to Develop Intrinsically Resilient Energy Control Systems. Proceedings of the 7th International Conference on Semantic Technologies for Intelligence, Defense, and Security (STIDS 2012). October 23-26 , 2012. Fairfax, VA. pdf
Foo, E. Branagan, M. Morris, T. A Proposed Australian Industrial Control System Security. Proceedings of the 46th IEEE Hawaii International Conference on System Sciences (HICSS – 46). January 7-10, 2013. Grand Wailea, Maui. pdf
Morris, T., Vaughn, R., Dandass, Y. Deterministic Intrusion Detection Rules for MODBUS Protocols. Proceedings of the 46th IEEE Hawaii International Conference on System Sciences (HICSS – 46). January 7-10, 2013. Grand Wailea, Maui. pdf
Morris, T., Adhikari, U., Pan, S. Cyber Security Recommendations for Wide Area Monitoring, Protection, and Control Systems. IEEE Power Energy Society General Meeting. July 22-26, 2012. San Diego, CA. pdf
Adhikari, U., Morris, T., Dahal, N., Pan, S., King, R., Younan, N. Madani, V. Development of Power System Test Bed for Data Mining of Synchrophasors Data, Cyber-Attack and Relay Testing in RTDS. IEEE Power Energy Society General Meeting. July 22-26, 2012. San Diego, CA. pdf
Owens, S., Morris, T., Hall, G. A Multi-Team Multi-Semester Large-Scale Capstone Project Experience. Proceedings of 2012 ASEE Southeastern Section Annual Conference and Meeting. April 1-3, 2012. Mississippi State, MS. pdf
Cody Tankersley, Yoginder S. Dandass, and Thomas H. Morris , “PCI Probe: A Tool for Testing PCIe Peripheral Devices in 64-bit Windows 7,” in Proceedings of the 27th International Conference on Computers and Their Applications (CATA-2012), Las Vegas, March 12–14. pdf
Morris, T., Vaughn, R., Dandass, Y. A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems. Proceedings of the 45th IEEE Hawaii International Conference on System Sciences (HICSS – 45). January 4-7, 2012. Grand Wailea, Maui. pdf
Morris, T., Pan, S., Lewis, J., Moorhead, J., Reaves, B., Younan, N., King, R., Freund, M., Madani, V. Cybersecurity Testing of Substation Phasor Measurement Units and Phasor Data Concentrators. The 7th Annual ACM Cyber Secruity and Information Intelligence Research Workshop (CSIIRW). October 12-14, 2011. Oak Ridge, TN. pdf
Morris, T., Vaughn, R., Dandass, Y. A Testbed for SCADA Control System Cybersecurity Research and Pedagogy. The 7th Annual ACM Cyber Secruity and Information Intelligence Research Workshop (CSIIRW). October 12-14, 2011. Oak Ridge, TN. pdf
Schmidt, P., Zalewski, J., Murphy, G., Morris, T., Carmen, C., van Susante, P., Case Studies in Application of System Engineering Practices to Capstone Projects. 118th Annual American Society of Engineering Educators Conference and Exposition. June 26-29, 2011. Vancouver, Canada. pdf
Morris, T., Pavurapu, K. A Retrofit Network Transaction Data Logger and Intrusion Detection System for Transmission and Distribution Substations, in the Proceedings of 2010 IEEE International Power and Energy Conference. Kuala Lumpur, Malaysia. Nov 29, 2010. pdf
Gao, W., Morris, T., Reaves, B., Richey, D. On SCADA Control System Command and Response Injection and Intrusion Detection, in the Proceedings of 2010 IEEE eCrime Researchers Summit. Dallas, TX. Oct 18-20, 2010. pdf Best Paper Award Winner!
Reaves, B., Morris, T., Discovery, Infiltration, and Denial of Service in a Process Control System Wireless Network. IEEE eCrime Researchers Summit. October 20-21, 2009. Tacoma, WA. pdf
Morris, T., Srivastava, A., Reaves, B., Pavurapu, K., Abdelwahed, S., Vaughn, R., McGrew, W., Dandass, Y. Engineering Future Cyber-Physical Energy Systems: Challenges, Research Needs, and Roadmap. 2009 IEEE North American Power Symposium. October 4-6, 2009. Starkville, MS. pdf
Morris, T. Nair, V.S.S. Encryption Key Protection for Private Computing on Public Platforms. Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications (Percom 2009). Galveston, TX, USA. 9-13 March 2009 pdf
Morris, T. Nair, V.S.S. Secure Context Switch for Private Computing on Public Platforms. Proceedings of the 2008 IEEE Global Telecommunications Conference (Globecom 2008). New Orleans, LA, USA. 1-4 December 2008 pdf
Morris, T. Nair, V.S.S. Privacy Protected ELF for Private Computing on Public Platforms. Proceedings of the Third International Conference on Availability, Reliability, and Security (ARES2008). Barcelona, Spain. March 4-7, 2008. pdf
Morris, T. Nair, V.S.S. PCPP: On Remote Host Assessment via Naive Bayesian Classification. IEEE International Parallel and Distributed Processing Symposium (IPDPS 2007). Long Beach, CA, USA. 26-30 March 2007. pdf
Morris, T. Nair, V.S.S. PCPP: Private Computing on Public Platforms A New Paradigm in Public Computing. 2nd IEEE International Symposium on Wireless Pervasive Computing (ISWPC 2007). San Juan, PR, USA. Feb. 2007. pdf
Tutorial
Alves, T., Morris, T., Using OpenPLC to Model and Simulate SCADA and Industrial Control Systems, Interservice/Industry Training, Simulation and Education Conference (I/ITSEC), Nov 27 - Dec 1, 2023. (to appear).
Technical Reports
Morris, T. Nair, V.S.S. Private Computing on a Public Platform. Department of Computer Science and Engineering. Southern Methodist University. Technical Report 06-CSE-01. 2006. Dallas, TX, USA. pdf
Refereed PHD Dissertations
Wright, S. A High-speed Simulation and Cybersecurity Regression Testing Platform for Industrial Control Systems. August, 2023. link
Werth, A. Evaluation of an Embedded Process Prediction Intrusion Prevention System for Industrial Control Systems. Department of Electrical and Computer Engineering, University of Alabama in Huntsville, December 2020. link
Das, A. An Embedded Defense-in-Depth Module for Detecting Cyber-attacks on Interdependent SCADA Controllers. Department of Electrical and Computer Engineering, University of Alabama in Huntsville, December 2020. link
Griffith, S. A Virtual Cyber-physical System Testbed for Use in Network Intrusion Detection and Prevention System Verification. Department of Electrical and Computer Engineering, University of Alabama in Huntsville, May 2020. link
Alves, T. OpenPLC: Towards a Fully Open and Secure Programmable Logic Controller. Department of Electrical and Computer Engineering, University of Alabama in Huntsville, May 2019. link
Adhikari, U. Event and Intrusion Detection Systems for Cyber-physical Power Systems. Department of Electrical and Computer Engineering, Mississippi State University, August 2015. link
Pan, S. Cybersecurity Testing and Intrusion Detection for Cyber-physical Power Systems. Department of Electrical and Computer Engineering, Mississippi State University, August 2014. link
Gao, W. Cyber Threats, Attacks and Intrusion Detection in Supervisory Control and Data Acquisition Networks. Department of Electrical and Computer Engineering, Mississippi State University, December 2013. link
Refereed MS Thesis
Richey, D. Leveraging PLC ladder logic for signature based IDS rule generation. Department of Electrical and Computer Engineering, Mississippi State University, August 2016. link
Turnipseed, I., A new SCADA dataset for intrusion detection system research. Department of Electrical and Computer Engineering, Mississippi State University, August 2015 link.
Thorton, Z. A Virtualized SCADA Laboratory for Research and Teaching. Department of Electrical and Computer Engineering, Mississippi State University, May 2015. link
Mudd, D. A Virtual Hydroelectric Power System for Distributable Industrial Control System Security Research. Department of Electrical and Computer Engineering, Mississippi State University, August 2014. link
Owens, S. Design Modifications and Platform Implementation Procedures for Supporting Dynamic Partial Reconfiguration of FPGA Applications. Department of Electrical and Computer Engineering, Mississippi State University, August 2013. link
Edwards, J. Open Source IPSEC Software in Manned and Unmanned Space Missions. Department of Electrical and Computer Engineering, Mississippi State University, August 2012. link
Reaves, B. An Open Virtual Testbed for Industrial Control System Security Research. Department of Electrical and Computer Engineering, Mississippi State University, August 2011. link
Pavurapu, K. A Retrofit Network Transaction Data Logger for SCADA Control Systems . Department of Electrical and Computer Engineering, Mississippi State University, August 2010. link
Conference Poster
Reaves, B., Morris, T., Vulnerabilities in a Proprietary SCADA Wireless System. IEEE Power Energy Society Transmission and Distribution Conference. April 19-22, 2010. New Orleans, LA. pdf Best Undergraduate Poster Winner!
Thesis
Morris, T. Private Computing on Public Platforms. Department of Computer Science and Engineering, Southern Methodist University, July 31, 2008 pdf
Maps
The Center for Cybersecurity Research and Education (CCRE) is located in room #301 of the Optics Building.
GPS coordinates: 34.7225,-86.6379.
Building #31 on this map.