On Optimal Input Design and Model Selection for Communication Channels Conference Paper January, 2013
Computing Legacy Software Behavior to Understand Functionality and Security Properties: An IBM/370 Demonstration Conference Paper January, 2013
2013 Proceedings of the Eight Annual Cyber Security and Information Intelligence Research Workshop... Book January, 2013
Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems Conference Paper January, 2013
Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure Conference Paper January, 2013
Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)... Conference Paper January, 2013