Not So Predictable Mining Pools: Attacking Solo Mining Pools by Bagging Blocks and Conning Competitors Conference Paper March, 2018
Automated Behavior Analysis of Malware: A Case Study of WannaCry Ransomware Conference Paper January, 2018
Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors Conference Paper January, 2018
Real-Time Cyber-Physical False Data Attack Detection in Smart Grids Using Neural Networks Conference Paper December, 2017
Setting the threshold for high throughput detectors: A mathematical approach for ensembles of dynamic, heterogeneous, probabilistic anomaly detectors Conference Paper December, 2017
Improving Scientific Data Analysis Through Multi-touch Enabled Interactive Data Visualization with Applications to Neutron Science Conference Paper October, 2017
Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks... Conference Paper April, 2017
Implementation of a Wireless Time Distribution Testbed Protected with Quantum Key Distribution... Conference Paper March, 2017