Control-Theory-Informed Feature Selection for Detecting Malicious Tampering in Additive Layer Manufacturing Processes Conference Paper February, 2021
Methods and Comparisons Between Computer Vision and Radar Based Vehicle Location Conference Paper January, 2021
Using Low-Cost “Garage Band” Recording Technology for Acquiring High Resolution High-Speed Data... Conference Paper September, 2020
Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems Conference Paper August, 2020
Design and Implementation of Full-Scale Industrial Control System Test Bed for Assessing Cyber-Security Defenses Conference Paper August, 2020
A Novel Vetting Approach to Cybersecurity Verification in Energy Grid Systems Conference Paper July, 2020
Performance Evaluation of a Two-Dimensional Flood Model on Heterogeneous High-Performance Computing Architectures Conference Paper June, 2020
Volatile Memory Extraction- Based Approach for Level 0‐1 CPS Forensics Conference Paper November, 2019
Detecting Sensors and Inferring their Relations at Level-0 in Industrial Cyber-Physical Systems Conference Paper November, 2019