Search results
-
-
Title
-
Automated formal analytics for smart grid security and resiliency
-
Author
-
Rahman, Mohammad
-
Date Created
-
2015
-
Description
-
Smart grid is the modernization of the legacy electric power system in which cyber computing and communications are integrated with the physical world of power systems. A smart grid provides efficient and cost-effective management of the grid by a...
-
-
Title
-
Automated formal analytics for smart grid security and resiliency
-
Author
-
Rahman, Mohammad
-
Date Created
-
2015
-
Subjects--Topical
-
Computer science, Sports administration
-
Description
-
Smart grid is the modernization of the legacy electric power system in which cyber computing and communications are integrated with the physical world of power systems. A smart grid provides efficient and cost-effective management of the grid by a...
-
-
Title
-
Cyber Agility for Attack Deterrence and Deception
-
Author
-
Jafarian, Jafar Haadi
-
Date Created
-
2017
-
Description
-
In recent years, we have witnessed a rise in quantity and sophistication of cyber attacks. Meanwhile, traditional defense techniques have not been adequate in addressing this status quo. This is because the focus has remained mostly on either iden...
-
-
Title
-
Cyber Agility for Attack Deterrence and Deception
-
Author
-
Jafarian, Jafar Haadi
-
Date Created
-
2017
-
Description
-
In recent years, we have witnessed a rise in quantity and sophistication of cyber attacks. Meanwhile, traditional defense techniques have not been adequate in addressing this status quo. This is because the focus has remained mostly on either iden...
-
-
Title
-
Cyber Agility for Attack Deterrence and Deception
-
Author
-
Jafarian, Jafar Haadi
-
Date Created
-
2017
-
Subjects--Topical
-
Computer science
-
Description
-
In recent years, we have witnessed a rise in quantity and sophistication of cyber attacks. Meanwhile, traditional defense techniques have not been adequate in addressing this status quo. This is because the focus has remained mostly on either iden...
-
-
Title
-
Formal Techniques for Cyber Resilience: Modeling, Synthesis, and Verification
-
Author
-
Alsaleh, Mohammed Noraden
-
Date Created
-
2018
-
Description
-
As cyber vulnerability and complexity increases, cyber attacks become highly sophisticated and inevitable. Therefore, cyber resilience is necessary to make cyber capable of misleading attackers in reaching their goals, resisting their progress, an...
-
-
Title
-
Formal Techniques for Cyber Resilience: Modeling, Synthesis, and Verification
-
Author
-
Alsaleh, Mohammed Noraden
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
As cyber vulnerability and complexity increases, cyber attacks become highly sophisticated and inevitable. Therefore, cyber resilience is necessary to make cyber capable of misleading attackers in reaching their goals, resisting their progress, an...
-
-
Title
-
Intrusion Detection and Deterrence for Critical Infrastructures
-
Author
-
Ali, Muhammad
-
Date Created
-
2016
-
Description
-
Critical infrastructures are the systems and networks that are so vital that their unavailability would have a major impact on national security, economy, safety, or any combination thereof. Examples of critical infrastructure are power systems, f...
-
-
Title
-
Intrusion Detection and Deterrence for Critical Infrastructures
-
Author
-
Ali, Muhammad
-
Date Created
-
2016
-
Description
-
Critical infrastructures are the systems and networks that are so vital that their unavailability would have a major impact on national security, economy, safety, or any combination thereof. Examples of critical infrastructure are power systems, f...
-
-
Title
-
Intrusion Detection and Deterrence for Critical Infrastructures
-
Author
-
Ali, Muhammad
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Critical infrastructures are the systems and networks that are so vital that their unavailability would have a major impact on national security, economy, safety, or any combination thereof. Examples of critical infrastructure are power systems, f...
-
-
Title
-
Software-Defined Cyber Agility for Active Cyber Defense
-
Author
-
Gillani, Syed Fida
-
Date Created
-
2017
-
Description
-
The scale and sophistication of stealthy and persistent cyber-attacks like distributed denial-of-service (DDoS) and man-in-the-middle (MitM) have been rapidly increasing in recent years. There are fundamental Internet properties, attributed to the...
-
-
Title
-
Software-Defined Cyber Agility for Active Cyber Defense
-
Author
-
Gillani, Syed Fida
-
Date Created
-
2017
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
The scale and sophistication of stealthy and persistent cyber-attacks like distributed denial-of-service (DDoS) and man-in-the-middle (MitM) have been rapidly increasing in recent years. There are fundamental Internet properties, attributed to the...