Distributed Detection and Isolation of Topology Attacks in Power Networks |
|
NCS security experimentation using DETER |
|
Integrated Simulation and Emulation Platform for Cyber-Physical System Security Experimentation |
|
2012 HiCoNS Program Agenda |
|
C3E 2019 Homepage |
|
About SoS |
|
Education |
|
C3E 2019 Mid-Year Event Agenda |
|
AFOSR: Information, Operations, and Security Program Review |
|
DHOSA: Defending Against Hostile Operating Systems |
|
CyberBAT: High Performance Cloud Auditing and Applications |
|
Using Computational Resources Without Assuming Their Correctness |
|
Controllability of Complex Networks |
|
Cybersecurity through Nimble Task Allocation: Workflow Reasoning for Mission-Centered Network Models |
|
Information Flow Integrity for Systems of Independently-Developed Components |
|
On the (Im)Possibility of Tamper-Resilient Cryptography |
|
Concurrency Attacks and Defenses |
|
Protection of Mission-Critical Applications from Untrusted Execution Environments |
|
Timing-based Inference: The Good, the Bad, and the Ugly |
|
Towards Practical Measures of Security |
|
Towards a Proof-Carrying Approach for Survivability Specification and Verification |
|
Integrating Programming Language and Operating System Information Security Mechanisms |
|
Stochastic Cyber Attack Processes: Concept, Statistical Analysis Framework and Case Study |
|
The Industrial Age of Hacking |
|
Information/Cognitive Warfare Across the Information Environment |
|