Mechanics and Quasi-Static Manipulation of Planar Elastic Kinematic Chains |
|
Quasi-static Manipulation of a Kirechhoff Elastic Rod Based on Geometric Analysis of Equilibrium Configurations |
|
Agent-Based Modeling of User Circumvention of Security |
|
Circumvention of Security: Good Users Do Bad Things |
|
A Lightweight Container-based Virtual Time System for Software-defined Network Emulation |
|
Convenus Congestrion Verification of Network Updates in Software-defined Networks |
|
fanti sos 2016 final |
|
11012016 Cao |
|
Beyond Pleading With or Restricting Users to Achieve Cyber Security Goals |
|
Flawed Mental Models Lead to Bad Cyber Security Decisions Lets Do a Better Job |
|
Stability of Discrete-time Switching Systems with Constrained Switching Sequences.pdf |
|
Extremal Storage Functions and Minimal Realizations of Discrete-time Linear Switching Systems.pdf |
|
An Algorithmic Approach to Error Localization and Partial Re-computation for Low-Overhead Fault Tolerance.pdf |
|
An Impact-Aware Defense against Stuxnet |
|
Deceptive Routing Games.pdf |
|
Dependable Demand Response Management in the Smart Grid A Stackelberg Game Approach.pdf |
|
Deployment and Exploitation of Deceptive Honeybots in Social Networks.pdf |
|
Distributed Optimization by Myopic Strategic Interactions and the Price of Heterogeneity.pdf |
|
Game-Theoretic Analysis of Node Capture and Cloning Attack with Multiple Attackers in Wireless Sensor Networks |
|
GUIDEX A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks |
|
Inverse Optimal Control for Deterministic Continuous-time Nonlinear Systems |
|
Mechanics and Manipulation of Planar Elastic Kinematic Chains.pdf |
|
Price-Based Distributed Control for Networked Plug-in Electric Vehicles |
|
Resilient Control of Cyber-Physical Systems against Denial-of-Service Attacks |
|
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids |
|