OCTOBER 22, 2024 Conference Paper Gender Mainstreaming in Nuclear Security: Strategies for Incorporating Gender Equality by Design in the IAEA Milestones Approach ( Read More )
OCTOBER 12, 2024 Report The Design and Evaluation of Zero Trust Architecture for Electric Vehicle Charging Infrastructure: EVs @ Scale Series on EV Charging Station Cybersecurity ( Read More )
SEPTEMBER 20, 2024 Report Solar Industry Manufacturer Experience with The SD2-C2M2 Assessment Tool ( Read More )
AUGUST 7, 2024 Conference Paper Harnessing ML Privacy by Design Through Crossbar Array Non-idealities ( Read More )
AUGUST 6, 2024 Journal Article Automating the Detection of Hydrological Barriers and Fragmentation in Wetlands using Deep Learning and InSAR ( Read More )
JULY 26, 2024 Report Countering Weapons of Mass Destruction (CWMD) Device Cybersecurity Characterization Process and Profile ( Read More )
APRIL 26, 2024 Conference Paper Malicious Cyber Activity Detection using Zigzag Persistence ( Read More )
APRIL 17, 2024 Report Exploring the Adoption Challenges of Post-Quantum Cryptography in EV Charging Infrastructure ( Read More )
APRIL 13, 2024 Conference Paper Hybrid Attack Graph Generation with Graph Convolutional Deep-Q Learning ( Read More )
APRIL 3, 2024 Conference Paper Sensor and Actuator Attacks on Hierarchical Control Systems with Domain-Aware Operator Theory ( Read More )
FEBRUARY 15, 2024 Conference Paper Denial of Service Attack Detection via Differential Analysis of Generalized Entropy Progressions ( Read More )
FEBRUARY 15, 2024 Conference Paper Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU System ( Read More )
NOVEMBER 8, 2023 Report Inventory of Public Key Cryptography in US Electric Vehicle Charging ( Read More )
OCTOBER 31, 2023 Report Universal Utility Data Exchange (UUDEX): Information Exchange Models for Solar DER ( Read More )
OCTOBER 24, 2023 Report Increased Interpretability for Model-Driven Deception: MARS LDRD Project ( Read More )
AUGUST 25, 2023 Journal Article Phishing in the Wild: An Ecologically Valid Study of the Phishing Tactics and Human Factors that Predict Susceptibility to a Phishing Attack ( Read More )
AUGUST 13, 2023 Report Sample Cybersecurity Clauses for EV Charging Infrastructure Procurements ( Read More )
AUGUST 5, 2023 Report Universal Utility Data Exchange (UUDEX): Information Exchange Models for Solar DER - Rev. 1 ( Read More )