MARCH 7, 2025 Journal Article A Generalized Approach to the Operationalization of Software Quality Models ( Read More )
FEBRUARY 26, 2025 Conference Paper Framework for Quantitative Evaluation of Resilience Solutions: An Approach to Determine the Value of Resilience for a Particular Site ( Read More )
FEBRUARY 26, 2025 Conference Paper A Hybrid Anomaly Detection Approach for Obfuscated Malware ( Read More )
DECEMBER 4, 2024 Report Countering Weapons of Mass Destruction Office (CWMD) Data Categorization Study: Chemical, Biological, Radiological, and Nuclear (CBRN) Detection Device Data ( Read More )
NOVEMBER 22, 2024 Report Countering Weapons of Mass Destruction (CWMD) Device Cybersecurity Characterization Process and Profile ( Read More )
NOVEMBER 21, 2024 Report Efficient Hybrid Attack Graph Generation for Cyber-Physical System Resilience Experimentation: Final Project Report ( Read More )
OCTOBER 12, 2024 Report The Design and Evaluation of Zero Trust Architecture for Electric Vehicle Charging Infrastructure: EVs @ Scale Series on EV Charging Station Cybersecurity ( Read More )
SEPTEMBER 20, 2024 Report Solar Industry Manufacturer Experience with The SD2-C2M2 Assessment Tool ( Read More )
AUGUST 7, 2024 Conference Paper Harnessing ML Privacy by Design Through Crossbar Array Non-idealities ( Read More )
AUGUST 6, 2024 Journal Article Automating the Detection of Hydrological Barriers and Fragmentation in Wetlands using Deep Learning and InSAR ( Read More )
JULY 26, 2024 Report Countering Weapons of Mass Destruction (CWMD) Device Cybersecurity Characterization Process and Profile ( Read More )
APRIL 26, 2024 Conference Paper Malicious Cyber Activity Detection using Zigzag Persistence ( Read More )
APRIL 17, 2024 Report Exploring the Adoption Challenges of Post-Quantum Cryptography in EV Charging Infrastructure ( Read More )
APRIL 13, 2024 Conference Paper Hybrid Attack Graph Generation with Graph Convolutional Deep-Q Learning ( Read More )
APRIL 3, 2024 Conference Paper Sensor and Actuator Attacks on Hierarchical Control Systems with Domain-Aware Operator Theory ( Read More )
FEBRUARY 15, 2024 Conference Paper Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU System ( Read More )
FEBRUARY 15, 2024 Conference Paper Denial of Service Attack Detection via Differential Analysis of Generalized Entropy Progressions ( Read More )
NOVEMBER 8, 2023 Report Inventory of Public Key Cryptography in US Electric Vehicle Charging ( Read More )