Many of our critical infrastructure systems and personal computing syste...
Smart manufacturing systems are being deployed at a growing rate because...
We consider a security game in a setting consisting of two players (an
a...
IoT systems have been facing increasingly sophisticated technical proble...
We model the behavioral biases of human decision-making in securing
inte...
Decades of continuous scaling has reduced the energy of unit computing t...
We study the security of large-scale cyber-physical systems (CPS) consis...
We consider a system consisting of multiple interdependent assets, and a...
The performance of most error-correction algorithms that operate on geno...