0 items selected.
Select all items:
|
| Data-Driven Safety Verification of Complex Cyber-Physical Systems | Biblio | Heather Lucas | Jan 29 2020 - 6:28pm | Yes | Yes | | |
| Combining Simulation and Emulation Systems for Smart Grid Planning and Evaluation | File | awhitesell | Oct 15 2018 - 2:02pm | Yes | Yes | | |
| Combining Simulation and Emulation Systems for Smart Grid Planning and Evaluation | Biblio | awhitesell | Oct 15 2018 - 2:02pm | Yes | Yes | | |
| High-Coverage Testing of Softwarized Networks.pdf | File | awhitesell | Oct 15 2018 - 1:55pm | Yes | Yes | | |
| High Coverage Testing of Softwarized Networks | Biblio | awhitesell | Oct 15 2018 - 1:55pm | Yes | Yes | | |
| A Comparative Study of Off-Line Deep Learning Based on Network Intrusion Detection | File | awhitesell | Oct 15 2018 - 1:48pm | Yes | Yes | | |
| A Comparative Study of Off-Line Deep Learning Based Network Intrusion Detection | Biblio | awhitesell | Oct 15 2018 - 1:48pm | Yes | Yes | | |
| Enabling a Resilient and Self-healing PMU Infrastructure Using Centralized Network Control | File | awhitesell | Jul 13 2018 - 2:24pm | Yes | Yes | | |
| Differentially Private Objective Functions in Distributed Cloud-based Optimization | Biblio | thurlwel | Oct 24 2017 - 5:36pm | Yes | Yes | | |
| 09182017 Ujcich | File | awhitesell | Sep 19 2017 - 2:51pm | Yes | Yes | | |
| Securing SDNs with App Provenance | Biblio | awhitesell | Sep 19 2017 - 2:51pm | Yes | Yes | | |
| Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs | File | thurlwel | Sep 1 2017 - 2:21pm | Yes | Yes | | |
| Toward a Cyber Resilient and Secure Microgrid Using Software-Defined Networking | File | thurlwel | Sep 1 2017 - 11:55am | Yes | Yes | | |
| Securing Industrial Control Systems with a Simulation-based Verification System | File | thurlwel | Sep 1 2017 - 11:25am | Yes | Yes | | |
| Predicting Network Futures with Plankton | File | thurlwel | Sep 1 2017 - 11:03am | Yes | Yes | | |
| Predicting Network Futures with Plankton | Biblio | thurlwel | Sep 1 2017 - 11:03am | Yes | Yes | | |
| xinyu poster | File | thurlwel | Aug 3 2017 - 12:03pm | Yes | Yes | | |
| Trust-Aware Failure Detector in Multi-Agent Systems | Biblio | thurlwel | Aug 3 2017 - 12:03pm | Yes | Yes | | |
| Shubham poster | File | thurlwel | Aug 3 2017 - 11:56am | Yes | Yes | | |
| Ransomware: Recommendations against the Extortion | Biblio | thurlwel | Aug 3 2017 - 11:56am | Yes | Yes | | |
| Esther poster | File | thurlwel | Aug 3 2017 - 11:53am | Yes | Yes | | |
| Multi-Agent System for Detecting Control-Related Attacks in Power Grids | Biblio | thurlwel | Aug 3 2017 - 11:53am | Yes | Yes | | |
| Ang poster | File | thurlwel | Aug 3 2017 - 11:49am | Yes | Yes | | |
| Privacy-Preserving Validation of Reachability Cross Multiple Software Defined Networks for Smart Grids | Biblio | thurlwel | Aug 3 2017 - 11:43am | Yes | Yes | | |
| Towards an Accountable Software-Defined Networking Architecture | File | thurlwel | Jul 19 2017 - 2:17pm | Yes | Yes | | |
| Decentralized Control with Moving-Horizon Linear Switched Systems: Synthesis and Testbed Implementation | File | thurlwel | Jul 19 2017 - 11:59am | Yes | Yes | | |
| Decentralized Control with Moving-Horizon Linear Switched Systems: Synthesis and Testbed Implementation | Biblio | thurlwel | Jul 19 2017 - 11:55am | Yes | Yes | | |
| Optimal Data Rate for State Estimation of Switched Nonlinear Systems | File | thurlwel | Jul 19 2017 - 11:51am | Yes | Yes | | |
| Optimal Data Rate for Estimation and Mode Detection of Switched Nonlinear Systems | Biblio | thurlwel | Jul 19 2017 - 11:49am | Yes | Yes | | |
| Differential Privacy in Linear Distributed Control Systems: Entropy Minimizing Mechanisms and Performance Tradeoffs | File | thurlwel | Jul 19 2017 - 11:45am | Yes | Yes | | |
| Differential Privacy and Entropy in Distributed Feedback Systems: Minimizing Mechanisms and Performance Trade-offs | Biblio | thurlwel | Jul 19 2017 - 11:42am | Yes | Yes | | |
| UiRef: Analysis of Sensitive User Inputs in Android Applications | File | thurlwel | Jul 18 2017 - 6:02pm | Yes | Yes | | |
| UiRef: Analysis of Sensitive User Inputs in Android Applications | Biblio | thurlwel | Jul 18 2017 - 5:56pm | Yes | Yes | | |
| Modeling Aggregate Security with User Agents thatEmploy Password Memorization Techniques | File | thurlwel | Jul 18 2017 - 5:48pm | Yes | Yes | | |
| Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques | Biblio | thurlwel | Jul 18 2017 - 5:44pm | Yes | Yes | | |
| Automated Test Input Generation for Android: Towards Getting There in an Industrial Case | File | thurlwel | Jul 18 2017 - 5:41pm | Yes | Yes | | |
| Automated Test Input Generation for Android: Towards Getting There in an Industrial Case | Biblio | thurlwel | Jul 18 2017 - 5:36pm | Yes | Yes | | |
| Lessons From the 100 Nation Ransomware Attack | Biblio | thurlwel | Jul 18 2017 - 5:02pm | Yes | Yes | | |
| Password Logbooks and What Their Amazon Reviews Reveal About Their Users’ Motivations, Beliefs, and Behaviors | File | thurlwel | Jul 18 2017 - 4:47pm | Yes | Yes | | |
| Password Logbooks and What Their Amazon Reviews Reveal About the Users’ Motivations, Beliefs, and Behaviors | Biblio | thurlwel | Jul 18 2017 - 3:21pm | Yes | Yes | | |
| Dandelion: Redesigning the Bitcoin Network for Anonymity | File | thurlwel | Jul 18 2017 - 2:24pm | Yes | Yes | | |
| Dandelion: Redesigning BitCoin Networking for Anonymity | Biblio | thurlwel | Jul 18 2017 - 1:57pm | Yes | Yes | | |
| Simulation of a Software-Defined Network as One Big Switch | File | thurlwel | Jul 18 2017 - 12:54pm | Yes | Yes | | |
| Simulation of a Software-Defined Network as One Big Switch | Biblio | thurlwel | Jul 18 2017 - 12:42pm | Yes | Yes | | |
| COCONUT: Seamless Scale-out of Network Elements | File | thurlwel | Jul 18 2017 - 12:33pm | Yes | Yes | | |
| COCONUT: Seamless Scale Out of Network Elements | Biblio | thurlwel | Jul 18 2017 - 12:23pm | Yes | Yes | | |
| Sean Smith HoTSoS Poster | File | awhitesell | Apr 21 2017 - 5:38pm | Yes | Yes | | |
| Flawed Mental Models Lead to Bad Cybersecurity Decisions: Let’s Do a Better Job! | Biblio | awhitesell | Apr 21 2017 - 5:37pm | Yes | Yes | | |
| Jim Blythe HoTSoS Poster 2 | File | awhitesell | Apr 21 2017 - 5:33pm | Yes | Yes | | |
| Analysis of Two Parallel Surveys on Cybersecurity: Users and Security Administrators — Notable Similarities and Differences | Biblio | awhitesell | Apr 21 2017 - 5:30pm | Yes | Yes | | |
| 02212017 Fanti | File | awhitesell | Apr 21 2017 - 5:09pm | Yes | Yes | | |
| Anonymity in the Bitcoin Peer-to-Peer Network | Biblio | awhitesell | Apr 21 2017 - 5:07pm | Yes | Yes | | |
| 02022017 QM slides Vaidya | File | awhitesell | Apr 21 2017 - 4:59pm | Yes | Yes | | |
| Privacy & Security in Machine Learning/Optimization | Biblio | awhitesell | Apr 21 2017 - 4:59pm | Yes | Yes | | |
| 02022017 QM slides Fanti | File | awhitesell | Apr 21 2017 - 4:53pm | Yes | Yes | | |
| Anonymity in the Bitcoin Peer-to-Peer Network | Biblio | awhitesell | Apr 21 2017 - 4:51pm | Yes | Yes | | |
| Kevin Jin NSA SoS Jan 2017 | File | awhitesell | Apr 21 2017 - 3:30pm | Yes | Yes | | |
| Enabling a Cyber-Resilient and Secure Energy Infrastructure with Software-Defined Networking | Biblio | awhitesell | Apr 21 2017 - 3:27pm | Yes | Yes | | |
| Optimal Data Rate for State Estimation of Switched Nonlinear Systems | File | awhitesell | Apr 21 2017 - 1:07pm | Yes | Yes | | |
| Optimal Data Rate for State Estimation of Switched Nonlinear Systems | Biblio | awhitesell | Apr 21 2017 - 1:05pm | Yes | Yes | | |
| Differential Privacy in Linear Distributed Control Systems Entropy Minimizing Mechanisms and Performance Tradeoffs | File | awhitesell | Apr 21 2017 - 12:55pm | Yes | Yes | | |
| Differential Privacy in Linear Distributed Control Systems: Entropy Minimizing Mechanisms and Performance Tradeoffs | Biblio | awhitesell | Apr 21 2017 - 12:51pm | Yes | Yes | | |
| Let Me Rephrase That Transparent Optimization in SDNs | File | awhitesell | Apr 21 2017 - 12:07pm | Yes | Yes | | |
| Let Me Rephrase That: Transparent Optimization in SDNs | Biblio | awhitesell | Apr 21 2017 - 12:03pm | Yes | Yes | | |
| Ultimate Forwarding Resilience in OpenFlow Networks | File | awhitesell | Apr 21 2017 - 11:48am | Yes | Yes | | |
| Let me rephrase that: Transparent optimization in SDNs | Biblio | Brighten Godfrey | Apr 3 2017 - 6:06pm | Yes | Yes | | |
| Tao Xie HoTSoS Poster | File | awhitesell | Apr 3 2017 - 5:26pm | Yes | Yes | | |
| Towards Privacy-Preserving Mobile Apps: A Balancing Act | Biblio | awhitesell | Apr 3 2017 - 5:26pm | Yes | Yes | | |
| Phoung Cao HoTSoS Poster | File | awhitesell | Apr 3 2017 - 5:21pm | Yes | Yes | | |
| Learning Factor Graphs for Preempting Multi-Stage Attacks in Clould Infrastructure | Biblio | awhitesell | Apr 3 2017 - 5:20pm | Yes | Yes | | |
| Kelly Greeling HoTSoS Poster | File | awhitesell | Apr 3 2017 - 5:17pm | Yes | Yes | | |
| Factors for Differentiating Human from Automated Attacks | Biblio | awhitesell | Apr 3 2017 - 5:17pm | Yes | Yes | | |
| Jim Blythe HoTSoS Poster | File | awhitesell | Apr 3 2017 - 5:13pm | Yes | Yes | | |
| FARM: Finding the Appropriate level of Realism for Modeling | Biblio | awhitesell | Apr 3 2017 - 5:13pm | Yes | Yes | | |
| An Approach to Incorporating Uncertainty in Network Security Analysis | File | awhitesell | Apr 3 2017 - 5:08pm | Yes | Yes | | |
| An Approach to Incorporating Uncertainty in Network Security Analysis | Biblio | awhitesell | Apr 3 2017 - 5:08pm | Yes | Yes | | |
| Esther Amullen HoTSoS Poster | File | awhitesell | Apr 3 2017 - 5:01pm | Yes | Yes | | |
| Multi-Agent System for Detecting False Data Injection Attacks Against the Power Grid | Biblio | awhitesell | Apr 3 2017 - 5:01pm | Yes | Yes | | |
| COCONUT: Seamless Scale-out of Network Elements | Biblio | Brighten Godfrey | Apr 3 2017 - 3:58pm | Yes | Yes | | |
| Analyzing the Cost of Securing Control Systems | Biblio | awhitesell | Mar 3 2017 - 4:35pm | Yes | Yes | | |
| Markov Chain Algorithms A Template for Building Future Robust Low-power Systems | File | awhitesell | Feb 17 2017 - 12:32pm | Yes | Yes | | |
| Markov Chain Algorithms: A Template for Building Future Robust Low-power Systems | Biblio | awhitesell | Feb 17 2017 - 12:20pm | Yes | Yes | | |
| Hierarchical Architectures of Resilient Control Systems Concepts Metrics and Design Principles | File | awhitesell | Feb 16 2017 - 5:18pm | Yes | Yes | | |
| Hierarchical Architectures of Resilient Control Systems: Concepts, Metrics, and Design Principles | Biblio | awhitesell | Feb 16 2017 - 5:16pm | Yes | Yes | | |
| Enforcing Customizable Consistency Properties in Software-Defined Networks | File | awhitesell | Feb 15 2017 - 5:08pm | Yes | Yes | | |
| Enforcing Generalized Consistency Properties in Software-Defined Networks | Biblio | awhitesell | Feb 15 2017 - 5:03pm | Yes | Yes | | |
| Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient? | Biblio | awhitesell | Feb 15 2017 - 4:08pm | Yes | Yes | | |
| Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient? | File | awhitesell | Feb 15 2017 - 1:44pm | Yes | Yes | | |
| Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient? | Biblio | awhitesell | Feb 15 2017 - 1:40pm | Yes | Yes | | |
| Resilient Distributed Control of Multi-agent Cyber-Physical Systems | File | awhitesell | Feb 10 2017 - 5:40pm | Yes | Yes | | |
| Resilient Distributed Control of Multi-agent Cyber-Physical Systems | Biblio | awhitesell | Feb 10 2017 - 5:37pm | Yes | Yes | | |
| Resilience in Consensus Dynamics via Competititve Interconnections | File | awhitesell | Feb 10 2017 - 5:31pm | Yes | Yes | | |
| Resilience in Consensus Dynamics via Competitive Interconnections | Biblio | awhitesell | Feb 10 2017 - 5:25pm | Yes | Yes | | |
| Quasi-static Manipulation of a Kirechhoff Elastic Rod Based on Geometric Analysis of Equilibrium Configurations | File | awhitesell | Feb 10 2017 - 4:50pm | Yes | Yes | | |
| Quasi-Static Manipulation of a Kirchhoff Elastic Road Based on a Geometric Analysis of Equilibrium Configurations | Biblio | awhitesell | Feb 10 2017 - 4:46pm | Yes | Yes | | |
| Game-Theoretic Methods for Distributed Management of Energy Resources in the Smart Grid poster | File | awhitesell | Feb 10 2017 - 4:13pm | Yes | Yes | | |
| Game-Theoretic Methods for Distributed Management of Energy Resources in the Smart Grid | Biblio | awhitesell | Feb 10 2017 - 4:10pm | Yes | Yes | | |
| Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense | File | awhitesell | Feb 10 2017 - 3:52pm | Yes | Yes | | |
| Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense | Biblio | awhitesell | Feb 10 2017 - 3:49pm | Yes | Yes | | |
| Ethnography of Computer Security Evasions in Healthcare Settings: Circumvention as the Norm | Biblio | awhitesell | Feb 10 2017 - 1:01pm | Yes | Yes | | |