MAY 13, 2025 Conference Paper Deciphering Discrepancies: A Comparative Analysis of Docker Image Security ( Read More )
APRIL 23, 2025 Conference Paper Beyond the Bridge: Contention-Based Covert and Side Channel Attacks on Multi-GPU Interconnect ( Read More )
APRIL 11, 2025 Journal Article Assay-based background projection for the Majorana Demonstrator using Monte Carlo Uncertainty Propagation ( Read More )
MARCH 26, 2025 Conference Paper Online Detection of Power Grid Anomalies via Federated Learning ( Read More )
MARCH 7, 2025 Journal Article A Generalized Approach to the Operationalization of Software Quality Models ( Read More )
FEBRUARY 26, 2025 Conference Paper Framework for Quantitative Evaluation of Resilience Solutions: An Approach to Determine the Value of Resilience for a Particular Site ( Read More )
FEBRUARY 26, 2025 Conference Paper A Hybrid Anomaly Detection Approach for Obfuscated Malware ( Read More )
DECEMBER 4, 2024 Report Countering Weapons of Mass Destruction Office (CWMD) Data Categorization Study: Chemical, Biological, Radiological, and Nuclear (CBRN) Detection Device Data ( Read More )
NOVEMBER 22, 2024 Report Countering Weapons of Mass Destruction (CWMD) Device Cybersecurity Characterization Process and Profile ( Read More )
NOVEMBER 21, 2024 Report Efficient Hybrid Attack Graph Generation for Cyber-Physical System Resilience Experimentation: Final Project Report ( Read More )
NOVEMBER 18, 2024 Journal Article Real-time Signal Detection for Cyclotron Radiation Emission Spectroscopy Measurements using Antenna Arrays ( Read More )
OCTOBER 12, 2024 Report The Design and Evaluation of Zero Trust Architecture for Electric Vehicle Charging Infrastructure: EVs @ Scale Series on EV Charging Station Cybersecurity ( Read More )
SEPTEMBER 20, 2024 Report Solar Industry Manufacturer Experience with The SD2-C2M2 Assessment Tool ( Read More )
SEPTEMBER 17, 2024 Journal Article Search for charge non-conservation and Pauli exclusion principle violation with the Majorana Demonstrator ( Read More )
AUGUST 7, 2024 Conference Paper Harnessing ML Privacy by Design Through Crossbar Array Non-idealities ( Read More )
AUGUST 6, 2024 Journal Article Automating the Detection of Hydrological Barriers and Fragmentation in Wetlands using Deep Learning and InSAR ( Read More )
JULY 26, 2024 Report Countering Weapons of Mass Destruction (CWMD) Device Cybersecurity Characterization Process and Profile ( Read More )