Industry

The document was issued by industry or industrial organization.
file

Visible to the public Adversarial Examples that Fool both Computer Vision and Time-Limited Humans

ABSTRACT

file

Visible to the public OODA Loops in Cyberspace: How Cyber Awareness Training Helps Threat Actors

Cybersecurity's human adversarial engagement is often lost in discussions of cybersecurity. We discuss how defenders' focus on technology unintentionally creates vulnerabilities which can be exploited by threat actors. In particular, we discuss how the convergence of cyber awareness training and defensive technologies is exploited by threat actors with devastating consequences.

news

Visible to the public 2018 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems: 10 April 2018, Porto, Portugal

Dear Colleagues,

It is my pleasure to invite you to the upcoming Workshop on Modeling and Simulation of Cyber-Physical Energy Systems!

http://www.palensky.org/mscpes/2018

After Berkeley, Berlin, Seattle, Vienna, and Pittsburgh, we are this time in beautiful Porto, Portugal, again co-located with the annual Cyber-Physical Systems Week.

Full paper submission deadline is 4th February 2018. Accepted and presented papers will be submitted to IEEE Xplore digital library.

file

Visible to the public George Washington's Teachings on Cyberwar

George Washington called West Point, "the key to the continent." The reasoning that Washington employed in establishing the fortifications at West Point is instructive to modern cyber warriors.

news

Visible to the public Call for Student Posters on Unmanned Aircraft Systems (UAS) Communications and Networking Research

Call for Student Posters on Unmanned Aircraft Systems (UAS) Communications and Networking Research

video

Visible to the public Shimmix Part 2

The Shimmix Security Enhanced System Incident Response.