Title Date
Using Run-Time Checking to Provide Safety and Progress for Distributed Cyber-Physical Systems
Website Detection Using Remote Traffic Analysis.pdf
Why Do Scala Developers Mix the Actor Model with other Concurrency Models.pdf
Adapting Bro into SCADA Building a Specification-based Intrusion Detection System for the DNP3 Protocol.pdf
Agent-Based Cyber Control Strategy Design for Resilient Control Systems Concepts Architecture and Methodologies
Game Theory Meets Network Security and Privacy
VeriFlow Verifying Network-Wide Invariants in Real Time
A Price-Based Approach for Controlling Networked Distributed Energy Resources abstract for CPSVO
A Price-Based Approach for Controlling Networked Distributed Energy Resources slides
An Experiment Using Factor Graph for Early Attack Detection
Decentralized Control of Linear Switched Nested Systems With l2 Induced Norm Performance
An Experiment Using Factor Graph for Early Attack Detection
Deceptive Routing Games
Learning Impedance Controller Parameters for Lower-Limb Prostheses
Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense
Game-Theoretic Methods for Distributed Management of Energy Resources in the Smart Grid poster
Quasi-static Manipulation of a Kirechhoff Elastic Rod Based on Geometric Analysis of Equilibrium Configurations
Resilience in Consensus Dynamics via Competititve Interconnections
Resilient Distributed Control of Multi-agent Cyber-Physical Systems
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?
Enforcing Customizable Consistency Properties in Software-Defined Networks
Hierarchical Architectures of Resilient Control Systems Concepts Metrics and Design Principles
Markov Chain Algorithms A Template for Building Future Robust Low-power Systems
Esther Amullen HoTSoS Poster
An Approach to Incorporating Uncertainty in Network Security Analysis