Follow

Submissions from 2019

PDF

Blockchain for Power Grids, Christian Banks, Samuel Kim, Michael Neposchlan, Nicholas Velez, K.J Duncan, John James, Aaron St. Leger, and Daniel Hawthorne

Link

Design of an Educational Cyber Range, Ryan Brunner, Sang Oh, Jesse Ramirez, Paul Houck, nathaniel stickney, and Ray Blaine

PDF

Simulation of Man in the Middle Attack On Smart Grid Testbed, Jared J. Fritz, Joseph Sagisi, John James, Aaron St. Leger, Kyle King, and Katherine Duncan

Link

Future OE Mission Command and Future OE Decision Cycles, John James

Submissions from 2018

Link

Towards energy-proportional anomaly detection in the smart grid, Spencer Drakontaidis, Michael Stanchi, Gabriel Glazer, Jason Hussey, Aaron St. Leger, and Suzanne Matthews

Link

It’s Complicated: A Big Data Approach to Exploring Planetesimal Evolution in the Presence of Jovian Planets, Kevin R. Grazier, Julie C. Castillo-Rogez, and Jonathan Horner

Link

Portable parallel computing with the raspberry pi, Suzanne Matthews, Joel Adams, Richard Brown, and Elizabeth Shoop

Link

Tactical Generator Monitoring System, Madison Stark, Nicholas Barry, and Aaron St. Leger

Emulation of Anomalies for Wide-Area Monitoring, Protection and Control Systems Development, Madison Stark, Caleb Clay, Aaron St. Leger, and Nicholas Barry

Link

Cyber-Physical Systems Approach for Wide Area Control Applications, Aaron St. Leger and John James

Submissions from 2017

Link

Investigating a raspberry pi cluster for detecting anomalies in the smart grid, Kasey Candelario, Chris Booth, Aaron St. Leger, and Suzanne Matthews

Link

Real-time Regex Matching with Apache Spark, Sean M. Deaton, David C. Brownfield, Leonard R. Kosta, Zhaozhong Zhu, and Suzanne J. Matthews

Link

Sociocultural Models of Nuclear Deterrence, Geoffrey P. Morgan, Michael J. Lanham, William Frankenstein, and Kathleen Carley

Link

Cyber Defense via Event-Based Modeling: An Approach for Modeling and Querying System of Systems Behaviors for Unwanted States, Joey Rivera

Link

Cyber Security via Formal Methods: A Framework for Implementing Formal Methods, Joey Rivera

Submissions from 2011

Link

Hacking Competitions and Their Untapped Potential for Security Education, Gregory Conti, Thomas Babbitt, and John Nelson