—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
This study presents an analysis of the impact of mitigation on computer worm propagation in Mobile Ad-hoc Networks (MANETS). According to the recent DARPA BAA Defense Against Cybe...
Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andr...
To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This...
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...