Most Recent Additions*

Link

Visualizing the Tactical Ground Battlefield in the Year 2050
Fernando Maymi, Alexander Kott, David Alberts, Amy Zalman, Paulo Shakarian, Cliff Wang, and Gang Qu

Link

A Control Measure Framework to Limit Collateral Damage and Propagation of Cyber Weapons
David Raymond, Gregory Conti, Tom Cross, and Robert Fanelli

Link

Towards a Cyber Common Operating Picture
Gregory Conti, John Nelson, and David Raymond

Link

Key Terrain in Cyberspace: Seeking the High Ground
David Raymond, Tom Cross, Gregory Conti, and Michael Nowatkowski

Link

A Flexible Modeling Framework for Studying Quantum Key Distribution System Implementation Non-Idealities
Logan Mailoux, Jeffrey Morris, Michael Grimaila, Douglas Hodson, David Jacques, John Columbi, Colin McLaughlin, and Jennifer Holes

Link

Cyber Education: A Multi-Level, Multi-Discipline Approach
Edward Sobiesk, Jean Blair, Gregory Conti, Michael J. Lanham, and Howard Taylor

Link

A Capstone Design Project for Teaching Cybersecurity to Non-technical Users
Tanya Estes, James Finocchiaro, Jean Blair, Johnathan Robison, Justin Dalme, Michael Emana, Luke Jenkins, and Edward Sobiesk

Link

Evaluating Single Board Computer Clusters for Cyber Operations
Suzanne J. Matthews, Raymond Blaine, and Aaron Brantly

Link

Preventing a Digital Pearl Harbor
Gregory Conti and David Raymond

Link

Unintended, Malicious, and Evil Applications of Augmented Reality
Gregory Conti, Edward Sobiesk, Paul Anderson, Steven Billington, Cory Kirk, Alexander Farmer, Patrick Shaffer, and Kyle Stammer

*Updated as of 07/17/18.