No abstract available.
Proceeding Downloads
The challenging nexus of technology and security in transportation management center operations
The growing dependency on the use of technology has increased the potential for cyber-security vulnerabilities. The purpose of this study was to provide insight by gathering feedback from industry operators, practitioners, and suppliers specifically ...
Understanding past, current and future communication and situational awareness technologies for first responders
This study builds a foundation for improving research for first responder communication and situational awareness technology in the future. In an online survey, we elicited the opinions of 250 U.S. first responders about effectiveness, security, and ...
Advancing cybersecurity education: pink elephant unicorn
Pink Elephant Unicorn (PEU) is a Science, Technology, Engineering, and Math (STEM) cybersecurity competition targeted at anyone who has a drive to learn about cybersecurity. Tasks included puzzle development, trivia creation, play zone development, ...
Hardening web applications using a least privilege DBMS access model
Within the last three years hundreds of millions of private data records have been compromised in high-profile data breaches, resulting in billions of dollars in economic losses and unrecoverable loss of privacy. One commonality is that attackers ...
Operational characteristics of modern malware: PCO threats
Active network threats are substantial hurdles for achieving absolute network security. This hurdle is due to the ability of highly infectious threats, like viruses and worms to propagate and duplicate autonomously and automatically, over a network. ...
Situational awareness for SCADA systems
As the threat level and attack sophistication increases for supervisory control and data acquisition (SCADA) systems, the need to increase the ability to detect, respond and recover becomes correspondingly important. This paper discusses the methods to ...
Development of industrial network forensics lessons
Most forensic investigators are trained to recognize abusive network behavior in conventional information systems, but they may not know how to detect anomalous traffic patterns in industrial control systems (ICS) that manage critical infrastructure ...
Qualitative risk assessment of cyberattacks on power systems
For almost 100 years, attacks on the electric infrastructure of a country have been identified as key vulnerabilities during times of war. Homegrown radical environmental groups and separatist movements in other countries have all waged war on the ...
Vulnerabilities under the surface: tracking potential vulnerabilities by voiding warranties
This paper will describe a practical methodology for understanding the cyber risk of a digital asset. This research attempts to gain a greater understanding of the cyber risk posed by a hardware-based computer asset by considering it as a sum of its ...
Dealing with the risk of organizational espionage
This paper reviews the issues involved with espionage in organizations. The dimensions of information are described as well as a brief history of espionage. There are multiple detection tools available to the organization that can be implemented, with ...
Developing a taxonomy of cyber attacks in WAMS
Power grids are undergoing their largest technological transformation since their invention. They are adopting technologies like Phasor Measurement Units (PMU) to obtain real- time measurements of the system and report them to the control center for ...
Security as a service: real-time intrusion detection in internet of things
With the increase in number of Internet connected devices, security and privacy concerns are the major obstacles impeding the widespread adoption of Internet of Things (IoT). Securing IoT has become a huge area of concern for all, including the ...
Exploring ensemble classifiers for detecting attacks in the smart grids
The advent of machine learning has made it a popular tool in various areas. It has also been applied in network intrusion detection. However, machine learning hasn't been sufficiently explored in the cyberphysical domains such as smart grids. This is ...
Cyber security considerations on PMU-based state estimation
State estimation allows continuous monitoring of a power system by estimating the power system state variables from measurement data. Unfortunately, the measurement data provided by the devices can serve as attack vectors for false data injection ...



