Enter search criteria and click Apply. Be sure to click Reset and re-enter criteria for subsequent searches.

If you are a CREDC funded student/researcher and need to report your publication, please use this form.

Total records for this search: 113

Runtime semantic security analysis to detect and mitigate control-related attacks in power grids

Lin, H., Slagell, A., Kalbarczyk, Z.
Year: 2016 | Type: Journal Article

Invisible and Forgotten: Zero-Day Blooms in the IoT

Palani, K., Holt, E., Smith, S.
Year: 2016 | Type: Proceedings

Discovering Computer Science & Programming through Scratch

Pitt, L., Rocke, J., Sebestik, J.
Year: 2016 | Type: Other

A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet

Nourian, A., and Madnick, S.
Year: 2015 | Type: Journal Article

Circuit Labs

Jana Sebestik
Year: 2019 | Type: Proceedings

Explore a Power Park: Paper Circuits

Jana Sebestik
Year: 2019 | Type: