Content Editor

UIUC Science of Security Lablet Research Initiative

Bulk operations
TitleTypeAuthorPost datesort iconPublishedPost: PublicTaxonomy termsEdit link
0 items selected. Select all items:
Data-Driven Safety Verification of Complex Cyber-Physical SystemsBiblioHeather LucasJan 29 2020 - 6:28pmYesYes
Combining Simulation and Emulation Systems for Smart Grid Planning and EvaluationFileawhitesellOct 15 2018 - 2:02pmYesYes
Combining Simulation and Emulation Systems for Smart Grid Planning and EvaluationBiblioawhitesellOct 15 2018 - 2:02pmYesYes
High-Coverage Testing of Softwarized Networks.pdfFileawhitesellOct 15 2018 - 1:55pmYesYes
High Coverage Testing of Softwarized NetworksBiblioawhitesellOct 15 2018 - 1:55pmYesYes
A Comparative Study of Off-Line Deep Learning Based on Network Intrusion DetectionFileawhitesellOct 15 2018 - 1:48pmYesYes
A Comparative Study of Off-Line Deep Learning Based Network Intrusion DetectionBiblioawhitesellOct 15 2018 - 1:48pmYesYes
Enabling a Resilient and Self-healing PMU Infrastructure Using Centralized Network ControlFileawhitesellJul 13 2018 - 2:24pmYesYes
Differentially Private Objective Functions in Distributed Cloud-based OptimizationBibliothurlwelOct 24 2017 - 5:36pmYesYes
09182017 UjcichFileawhitesellSep 19 2017 - 2:51pmYesYes
Securing SDNs with App ProvenanceBiblioawhitesellSep 19 2017 - 2:51pmYesYes
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access LogsFilethurlwelSep 1 2017 - 2:21pmYesYes
Toward a Cyber Resilient and Secure Microgrid Using Software-Defined Networking FilethurlwelSep 1 2017 - 11:55amYesYes
Securing Industrial Control Systems with a Simulation-based Verification SystemFilethurlwelSep 1 2017 - 11:25amYesYes
Predicting Network Futures with PlanktonFilethurlwelSep 1 2017 - 11:03amYesYes
Predicting Network Futures with PlanktonBibliothurlwelSep 1 2017 - 11:03amYesYes
xinyu posterFilethurlwelAug 3 2017 - 12:03pmYesYes
Trust-Aware Failure Detector in Multi-Agent SystemsBibliothurlwelAug 3 2017 - 12:03pmYesYes
Shubham posterFilethurlwelAug 3 2017 - 11:56amYesYes
Ransomware: Recommendations against the ExtortionBibliothurlwelAug 3 2017 - 11:56amYesYes
Esther posterFilethurlwelAug 3 2017 - 11:53amYesYes
Multi-Agent System for Detecting Control-Related Attacks in Power GridsBibliothurlwelAug 3 2017 - 11:53amYesYes
Ang posterFilethurlwelAug 3 2017 - 11:49amYesYes
Privacy-Preserving Validation of Reachability Cross Multiple Software Defined Networks for Smart GridsBibliothurlwelAug 3 2017 - 11:43amYesYes
Towards an Accountable Software-Defined Networking ArchitectureFilethurlwelJul 19 2017 - 2:17pmYesYes
Decentralized Control with Moving-Horizon Linear Switched Systems: Synthesis and Testbed ImplementationFilethurlwelJul 19 2017 - 11:59amYesYes
Decentralized Control with Moving-Horizon Linear Switched Systems: Synthesis and Testbed ImplementationBibliothurlwelJul 19 2017 - 11:55amYesYes
Optimal Data Rate for State Estimation of Switched Nonlinear SystemsFilethurlwelJul 19 2017 - 11:51amYesYes
Optimal Data Rate for Estimation and Mode Detection of Switched Nonlinear SystemsBibliothurlwelJul 19 2017 - 11:49amYesYes
Differential Privacy in Linear Distributed Control Systems: Entropy Minimizing Mechanisms and Performance TradeoffsFilethurlwelJul 19 2017 - 11:45amYesYes
Differential Privacy and Entropy in Distributed Feedback Systems: Minimizing Mechanisms and Performance Trade-offsBibliothurlwelJul 19 2017 - 11:42amYesYes
UiRef: Analysis of Sensitive User Inputs in Android ApplicationsFilethurlwelJul 18 2017 - 6:02pmYesYes
UiRef: Analysis of Sensitive User Inputs in Android ApplicationsBibliothurlwelJul 18 2017 - 5:56pmYesYes
Modeling Aggregate Security with User Agents thatEmploy Password Memorization TechniquesFilethurlwelJul 18 2017 - 5:48pmYesYes
Modeling Aggregate Security with User Agents that Employ Password Memorization TechniquesBibliothurlwelJul 18 2017 - 5:44pmYesYes
Automated Test Input Generation for Android: Towards Getting There in an Industrial CaseFilethurlwelJul 18 2017 - 5:41pmYesYes
Automated Test Input Generation for Android: Towards Getting There in an Industrial CaseBibliothurlwelJul 18 2017 - 5:36pmYesYes
Lessons From the 100 Nation Ransomware AttackBibliothurlwelJul 18 2017 - 5:02pmYesYes
Password Logbooks and What Their Amazon Reviews Reveal About Their Users’ Motivations, Beliefs, and BehaviorsFilethurlwelJul 18 2017 - 4:47pmYesYes
Password Logbooks and What Their Amazon Reviews Reveal About the Users’ Motivations, Beliefs, and BehaviorsBibliothurlwelJul 18 2017 - 3:21pmYesYes
Dandelion: Redesigning the Bitcoin Network for AnonymityFilethurlwelJul 18 2017 - 2:24pmYesYes
Dandelion: Redesigning BitCoin Networking for AnonymityBibliothurlwelJul 18 2017 - 1:57pmYesYes
Simulation of a Software-Defined Network as One Big SwitchFilethurlwelJul 18 2017 - 12:54pmYesYes
Simulation of a Software-Defined Network as One Big SwitchBibliothurlwelJul 18 2017 - 12:42pmYesYes
COCONUT: Seamless Scale-out of Network ElementsFilethurlwelJul 18 2017 - 12:33pmYesYes
COCONUT: Seamless Scale Out of Network ElementsBibliothurlwelJul 18 2017 - 12:23pmYesYes
Sean Smith HoTSoS PosterFileawhitesellApr 21 2017 - 5:38pmYesYes
Flawed Mental Models Lead to Bad Cybersecurity Decisions: Let’s Do a Better Job!BiblioawhitesellApr 21 2017 - 5:37pmYesYes
Jim Blythe HoTSoS Poster 2FileawhitesellApr 21 2017 - 5:33pmYesYes
Analysis of Two Parallel Surveys on Cybersecurity: Users and Security Administrators — Notable Similarities and DifferencesBiblioawhitesellApr 21 2017 - 5:30pmYesYes
02212017 FantiFileawhitesellApr 21 2017 - 5:09pmYesYes
Anonymity in the Bitcoin Peer-to-Peer NetworkBiblioawhitesellApr 21 2017 - 5:07pmYesYes
02022017 QM slides VaidyaFileawhitesellApr 21 2017 - 4:59pmYesYes
Privacy & Security in Machine Learning/OptimizationBiblioawhitesellApr 21 2017 - 4:59pmYesYes
02022017 QM slides FantiFileawhitesellApr 21 2017 - 4:53pmYesYes
Anonymity in the Bitcoin Peer-to-Peer NetworkBiblioawhitesellApr 21 2017 - 4:51pmYesYes
Kevin Jin NSA SoS Jan 2017FileawhitesellApr 21 2017 - 3:30pmYesYes
Enabling a Cyber-Resilient and Secure Energy Infrastructure with Software-Defined NetworkingBiblioawhitesellApr 21 2017 - 3:27pmYesYes
Optimal Data Rate for State Estimation of Switched Nonlinear Systems FileawhitesellApr 21 2017 - 1:07pmYesYes
Optimal Data Rate for State Estimation of Switched Nonlinear SystemsBiblioawhitesellApr 21 2017 - 1:05pmYesYes
Differential Privacy in Linear Distributed Control Systems Entropy Minimizing Mechanisms and Performance TradeoffsFileawhitesellApr 21 2017 - 12:55pmYesYes
Differential Privacy in Linear Distributed Control Systems: Entropy Minimizing Mechanisms and Performance TradeoffsBiblioawhitesellApr 21 2017 - 12:51pmYesYes
Let Me Rephrase That Transparent Optimization in SDNsFileawhitesellApr 21 2017 - 12:07pmYesYes
Let Me Rephrase That: Transparent Optimization in SDNsBiblioawhitesellApr 21 2017 - 12:03pmYesYes
Ultimate Forwarding Resilience in OpenFlow NetworksFileawhitesellApr 21 2017 - 11:48amYesYes
Let me rephrase that: Transparent optimization in SDNs BiblioBrighten GodfreyApr 3 2017 - 6:06pmYesYes
Tao Xie HoTSoS PosterFileawhitesellApr 3 2017 - 5:26pmYesYes
Towards Privacy-Preserving Mobile Apps: A Balancing ActBiblioawhitesellApr 3 2017 - 5:26pmYesYes
Phoung Cao HoTSoS PosterFileawhitesellApr 3 2017 - 5:21pmYesYes
Learning Factor Graphs for Preempting Multi-Stage Attacks in Clould InfrastructureBiblioawhitesellApr 3 2017 - 5:20pmYesYes
Kelly Greeling HoTSoS PosterFileawhitesellApr 3 2017 - 5:17pmYesYes
Factors for Differentiating Human from Automated AttacksBiblioawhitesellApr 3 2017 - 5:17pmYesYes
Jim Blythe HoTSoS PosterFileawhitesellApr 3 2017 - 5:13pmYesYes
FARM: Finding the Appropriate level of Realism for ModelingBiblioawhitesellApr 3 2017 - 5:13pmYesYes
An Approach to Incorporating Uncertainty in Network Security Analysis FileawhitesellApr 3 2017 - 5:08pmYesYes
An Approach to Incorporating Uncertainty in Network Security AnalysisBiblioawhitesellApr 3 2017 - 5:08pmYesYes
Esther Amullen HoTSoS PosterFileawhitesellApr 3 2017 - 5:01pmYesYes
Multi-Agent System for Detecting False Data Injection Attacks Against the Power GridBiblioawhitesellApr 3 2017 - 5:01pmYesYes
COCONUT: Seamless Scale-out of Network ElementsBiblioBrighten GodfreyApr 3 2017 - 3:58pmYesYes
Analyzing the Cost of Securing Control SystemsBiblioawhitesellMar 3 2017 - 4:35pmYesYes
Markov Chain Algorithms A Template for Building Future Robust Low-power SystemsFileawhitesellFeb 17 2017 - 12:32pmYesYes
Markov Chain Algorithms: A Template for Building Future Robust Low-power SystemsBiblioawhitesellFeb 17 2017 - 12:20pmYesYes
Hierarchical Architectures of Resilient Control Systems Concepts Metrics and Design PrinciplesFileawhitesellFeb 16 2017 - 5:18pmYesYes
Hierarchical Architectures of Resilient Control Systems: Concepts, Metrics, and Design PrinciplesBiblioawhitesellFeb 16 2017 - 5:16pmYesYes
Enforcing Customizable Consistency Properties in Software-Defined NetworksFileawhitesellFeb 15 2017 - 5:08pmYesYes
Enforcing Generalized Consistency Properties in Software-Defined NetworksBiblioawhitesellFeb 15 2017 - 5:03pmYesYes
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?BiblioawhitesellFeb 15 2017 - 4:08pmYesYes
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?FileawhitesellFeb 15 2017 - 1:44pmYesYes
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?BiblioawhitesellFeb 15 2017 - 1:40pmYesYes
Resilient Distributed Control of Multi-agent Cyber-Physical SystemsFileawhitesellFeb 10 2017 - 5:40pmYesYes
Resilient Distributed Control of Multi-agent Cyber-Physical SystemsBiblioawhitesellFeb 10 2017 - 5:37pmYesYes
Resilience in Consensus Dynamics via Competititve InterconnectionsFileawhitesellFeb 10 2017 - 5:31pmYesYes
Resilience in Consensus Dynamics via Competitive InterconnectionsBiblioawhitesellFeb 10 2017 - 5:25pmYesYes
Quasi-static Manipulation of a Kirechhoff Elastic Rod Based on Geometric Analysis of Equilibrium ConfigurationsFileawhitesellFeb 10 2017 - 4:50pmYesYes
Quasi-Static Manipulation of a Kirchhoff Elastic Road Based on a Geometric Analysis of Equilibrium ConfigurationsBiblioawhitesellFeb 10 2017 - 4:46pmYesYes
Game-Theoretic Methods for Distributed Management of Energy Resources in the Smart Grid posterFileawhitesellFeb 10 2017 - 4:13pmYesYes
Game-Theoretic Methods for Distributed Management of Energy Resources in the Smart GridBiblioawhitesellFeb 10 2017 - 4:10pmYesYes
Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target DefenseFileawhitesellFeb 10 2017 - 3:52pmYesYes
Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target DefenseBiblioawhitesellFeb 10 2017 - 3:49pmYesYes
Ethnography of Computer Security Evasions in Healthcare Settings: Circumvention as the NormBiblioawhitesellFeb 10 2017 - 1:01pmYesYes