Network

file

Visible to the public Malware Defense via Download Provenance Classification

ABSTRACT

Modern malware developers make extensive use of sophisticated obfuscation tools, causing a steady decline in the detection capabilities of anti-virus (AV) file scanners. This motivates the need for new ways to detect malware without relying on the inspection of a file's content. As most modern malware are distributed through network downloads, we should aim to complement AV scanners with systems that detect malware files based on where they come from, rather than only considering how they look like.

file

Visible to the public Networked Control System Wind Tunnel (NCSWT)- An evaluation tool for networked multi-agent systems

Cyber-physical systems, such groups of unmanned aerial vehicles, are often monitored and controlled by networked control systems (NCS). NCS are deployed in many environments subject to realistic, complex network interactions, so evaluation of NCS is crucial to ensuring that NCS function as intended. Given the varied nature of NCS, it is appropriate to use a heterogenous simulation environment to capture the dynamics; however, the design and integration of heterogeneous simulation environments is a complex problem.

file

Visible to the public Extending Passivity to Guarantee Properties in CPS design - Presentation from the NSF Kickoff on November 29, 2010 .pdf

The slides that were presented at the NSF Kickoff meeting on November 29, 2010. Contributors to the presentation include P. Antsaklis, V. Gupta, and B. Goodwine. Topics discussed within the presentation include Passivity & Dissipativity in Dynamical Systems, Event-Triggered Control, and Passivity Indices - Cascade.