| Distributed Detection and Isolation of Topology Attacks in Power Networks |
|
| NCS security experimentation using DETER |
|
| Integrated Simulation and Emulation Platform for Cyber-Physical System Security Experimentation |
|
| 2012 HiCoNS Program Agenda |
|
| C3E 2019 Homepage |
|
| About SoS |
|
| Education |
|
| C3E 2019 Mid-Year Event Agenda |
|
| AFOSR: Information, Operations, and Security Program Review |
|
| DHOSA: Defending Against Hostile Operating Systems |
|
| CyberBAT: High Performance Cloud Auditing and Applications |
|
| Using Computational Resources Without Assuming Their Correctness |
|
| Controllability of Complex Networks |
|
| Cybersecurity through Nimble Task Allocation: Workflow Reasoning for Mission-Centered Network Models |
|
| Information Flow Integrity for Systems of Independently-Developed Components |
|
| On the (Im)Possibility of Tamper-Resilient Cryptography |
|
| Concurrency Attacks and Defenses |
|
| Protection of Mission-Critical Applications from Untrusted Execution Environments |
|
| Timing-based Inference: The Good, the Bad, and the Ugly |
|
| Towards Practical Measures of Security |
|
| Towards a Proof-Carrying Approach for Survivability Specification and Verification |
|
| Integrating Programming Language and Operating System Information Security Mechanisms |
|
| Stochastic Cyber Attack Processes: Concept, Statistical Analysis Framework and Case Study |
|
| The Industrial Age of Hacking |
|
| Information/Cognitive Warfare Across the Information Environment |
|