Title Date
Attack models and scenarios for networked control systems
Distributed Detection and Isolation of Topology Attacks in Power Networks
NCS security experimentation using DETER
Integrated Simulation and Emulation Platform for Cyber-Physical System Security Experimentation
2012 HiCoNS Program Agenda
C3E 2019 Homepage
About SoS
Education
C3E 2019 Mid-Year Event Agenda
AFOSR: Information, Operations, and Security Program Review
DHOSA: Defending Against Hostile Operating Systems
CyberBAT: High Performance Cloud Auditing and Applications
Using Computational Resources Without Assuming Their Correctness
Controllability of Complex Networks
Cybersecurity through Nimble Task Allocation: Workflow Reasoning for Mission-Centered Network Models
Information Flow Integrity for Systems of Independently-Developed Components
On the (Im)Possibility of Tamper-Resilient Cryptography
Concurrency Attacks and Defenses
Protection of Mission-Critical Applications from Untrusted Execution Environments
Timing-based Inference: The Good, the Bad, and the Ugly
Towards Practical Measures of Security
Towards a Proof-Carrying Approach for Survivability Specification and Verification
Integrating Programming Language and Operating System Information Security Mechanisms
Stochastic Cyber Attack Processes: Concept, Statistical Analysis Framework and Case Study
The Industrial Age of Hacking