Computing Legacy Software Behavior to Understand Functionality and Security Properties: An IBM/370 Demonstration Conference Paper January, 2013
Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure Conference Paper January, 2013
Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)... Conference Paper January, 2013
Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems Conference Paper January, 2013
Experimental Validation of Stochastic Wireless Urban Channel Model: Estimation and Prediction Conference Paper November, 2012
Event-based Transmission Line Matrix Method for Simulating Site-Specific Multipath Propagation Characteristics... Conference Paper November, 2012
Determining System Parameters for Optimal Performance of Hybrid DS/FFH Spread-Spectrum Conference Paper November, 2012