| Mechanics and Quasi-Static Manipulation of Planar Elastic Kinematic Chains |
|
| Quasi-static Manipulation of a Kirechhoff Elastic Rod Based on Geometric Analysis of Equilibrium Configurations |
|
| Agent-Based Modeling of User Circumvention of Security |
|
| Circumvention of Security: Good Users Do Bad Things |
|
| A Lightweight Container-based Virtual Time System for Software-defined Network Emulation |
|
| Convenus Congestrion Verification of Network Updates in Software-defined Networks |
|
| fanti sos 2016 final |
|
| 11012016 Cao |
|
| Beyond Pleading With or Restricting Users to Achieve Cyber Security Goals |
|
| Flawed Mental Models Lead to Bad Cyber Security Decisions Lets Do a Better Job |
|
| Stability of Discrete-time Switching Systems with Constrained Switching Sequences.pdf |
|
| Extremal Storage Functions and Minimal Realizations of Discrete-time Linear Switching Systems.pdf |
|
| An Algorithmic Approach to Error Localization and Partial Re-computation for Low-Overhead Fault Tolerance.pdf |
|
| An Impact-Aware Defense against Stuxnet |
|
| Deceptive Routing Games.pdf |
|
| Dependable Demand Response Management in the Smart Grid A Stackelberg Game Approach.pdf |
|
| Deployment and Exploitation of Deceptive Honeybots in Social Networks.pdf |
|
| Distributed Optimization by Myopic Strategic Interactions and the Price of Heterogeneity.pdf |
|
| Game-Theoretic Analysis of Node Capture and Cloning Attack with Multiple Attackers in Wireless Sensor Networks |
|
| GUIDEX A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks |
|
| Inverse Optimal Control for Deterministic Continuous-time Nonlinear Systems |
|
| Mechanics and Manipulation of Planar Elastic Kinematic Chains.pdf |
|
| Price-Based Distributed Control for Networked Plug-in Electric Vehicles |
|
| Resilient Control of Cyber-Physical Systems against Denial-of-Service Attacks |
|
| Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids |
|