Title Date
Mechanics and Quasi-Static Manipulation of Planar Elastic Kinematic Chains
Quasi-static Manipulation of a Kirechhoff Elastic Rod Based on Geometric Analysis of Equilibrium Configurations
Agent-Based Modeling of User Circumvention of Security
Circumvention of Security: Good Users Do Bad Things
A Lightweight Container-based Virtual Time System for Software-defined Network Emulation
Convenus Congestrion Verification of Network Updates in Software-defined Networks
fanti sos 2016 final
11012016 Cao
Beyond Pleading With or Restricting Users to Achieve Cyber Security Goals
Flawed Mental Models Lead to Bad Cyber Security Decisions Lets Do a Better Job
Stability of Discrete-time Switching Systems with Constrained Switching Sequences.pdf
Extremal Storage Functions and Minimal Realizations of Discrete-time Linear Switching Systems.pdf
An Algorithmic Approach to Error Localization and Partial Re-computation for Low-Overhead Fault Tolerance.pdf
An Impact-Aware Defense against Stuxnet
Deceptive Routing Games.pdf
Dependable Demand Response Management in the Smart Grid A Stackelberg Game Approach.pdf
Deployment and Exploitation of Deceptive Honeybots in Social Networks.pdf
Distributed Optimization by Myopic Strategic Interactions and the Price of Heterogeneity.pdf
Game-Theoretic Analysis of Node Capture and Cloning Attack with Multiple Attackers in Wireless Sensor Networks
GUIDEX A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks
Inverse Optimal Control for Deterministic Continuous-time Nonlinear Systems
Mechanics and Manipulation of Planar Elastic Kinematic Chains.pdf
Price-Based Distributed Control for Networked Plug-in Electric Vehicles
Resilient Control of Cyber-Physical Systems against Denial-of-Service Attacks
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids