selected publications
-
academic article
- Defining and computing a value based cyber-security measure. Information Systems and E-business Management. 10:433-453. 2012
- Forewarning of Failure in Complex System. Journal of Homeland Security. 5:1-16. 2011
- Quantifying security threats and their potential impacts: a case study. Innovations in Systems and Software Engineering. 6:269-281. 2010
-
article
- Development of the Joint Weigh-In- Motion (WIM) and Measurement Reach Back Capability (WIM-RBC): The Configuration and Data Management Tool. SOLE Logistics Spectrum Magazine. 38:4-9. 2005
-
conference paper
- Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure. Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop. 2013
- Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA). Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop. 2013
- Secure VM for monitoring industrial process controllers. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research. 2011
- Secure cryptographic key management system (CKMS) considerations for smart grid devices. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research. 2011