Using Run-Time Checking to Provide Safety and Progress for Distributed Cyber-Physical Systems |
|
Website Detection Using Remote Traffic Analysis.pdf |
|
Why Do Scala Developers Mix the Actor Model with other Concurrency Models.pdf |
|
Adapting Bro into SCADA Building a Specification-based Intrusion Detection System for the DNP3 Protocol.pdf |
|
Agent-Based Cyber Control Strategy Design for Resilient Control Systems Concepts Architecture and Methodologies |
|
Game Theory Meets Network Security and Privacy |
|
VeriFlow Verifying Network-Wide Invariants in Real Time |
|
A Price-Based Approach for Controlling Networked Distributed Energy Resources abstract for CPSVO |
|
A Price-Based Approach for Controlling Networked Distributed Energy Resources slides |
|
An Experiment Using Factor Graph for Early Attack Detection |
|
Decentralized Control of Linear Switched Nested Systems With l2 Induced Norm Performance |
|
An Experiment Using Factor Graph for Early Attack Detection |
|
Deceptive Routing Games |
|
Learning Impedance Controller Parameters for Lower-Limb Prostheses |
|
Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense |
|
Game-Theoretic Methods for Distributed Management of Energy Resources in the Smart Grid poster |
|
Quasi-static Manipulation of a Kirechhoff Elastic Rod Based on Geometric Analysis of Equilibrium Configurations |
|
Resilience in Consensus Dynamics via Competititve Interconnections |
|
Resilient Distributed Control of Multi-agent Cyber-Physical Systems |
|
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient? |
|
Enforcing Customizable Consistency Properties in Software-Defined Networks |
|
Hierarchical Architectures of Resilient Control Systems Concepts Metrics and Design Principles |
|
Markov Chain Algorithms A Template for Building Future Robust Low-power Systems |
|
Esther Amullen HoTSoS Poster |
|
An Approach to Incorporating Uncertainty in Network Security Analysis |
|