| Using Run-Time Checking to Provide Safety and Progress for Distributed Cyber-Physical Systems |
|
| Website Detection Using Remote Traffic Analysis.pdf |
|
| Why Do Scala Developers Mix the Actor Model with other Concurrency Models.pdf |
|
| Adapting Bro into SCADA Building a Specification-based Intrusion Detection System for the DNP3 Protocol.pdf |
|
| Agent-Based Cyber Control Strategy Design for Resilient Control Systems Concepts Architecture and Methodologies |
|
| Game Theory Meets Network Security and Privacy |
|
| VeriFlow Verifying Network-Wide Invariants in Real Time |
|
| A Price-Based Approach for Controlling Networked Distributed Energy Resources abstract for CPSVO |
|
| A Price-Based Approach for Controlling Networked Distributed Energy Resources slides |
|
| An Experiment Using Factor Graph for Early Attack Detection |
|
| Decentralized Control of Linear Switched Nested Systems With l2 Induced Norm Performance |
|
| An Experiment Using Factor Graph for Early Attack Detection |
|
| Deceptive Routing Games |
|
| Learning Impedance Controller Parameters for Lower-Limb Prostheses |
|
| Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense |
|
| Game-Theoretic Methods for Distributed Management of Energy Resources in the Smart Grid poster |
|
| Quasi-static Manipulation of a Kirechhoff Elastic Rod Based on Geometric Analysis of Equilibrium Configurations |
|
| Resilience in Consensus Dynamics via Competititve Interconnections |
|
| Resilient Distributed Control of Multi-agent Cyber-Physical Systems |
|
| Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient? |
|
| Enforcing Customizable Consistency Properties in Software-Defined Networks |
|
| Hierarchical Architectures of Resilient Control Systems Concepts Metrics and Design Principles |
|
| Markov Chain Algorithms A Template for Building Future Robust Low-power Systems |
|
| Esther Amullen HoTSoS Poster |
|
| An Approach to Incorporating Uncertainty in Network Security Analysis |
|