Search Results - "Edgar, Thomas W."

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Guest Editorial: Special section on Resilient Control of Cyber-Physical Power and Energy Systems by Adetola, Veronica, Edgar, Thomas, Nandanoori, Sai Pushpak, Zhu, Quanyan, Rieger, Craig, Abbaszadeh, Masoud

    “…Our power and energy systems are becoming more and more integrated and interconnected. The increasing integration of edge devices and dependence on cyber…”
    Get full text
    Journal Article
  2. 2

    Experiment as a service by Edgar, Thomas W., Rice, Theora R.

    “…The absence of scientific validation of results is one of the greatest obstacles in the field of cyber security. The lack of reproducible experimental…”
    Get full text
    Conference Proceeding
  3. 3

    Evaluating transactive controls of integrated transmission and distribution systems using the Framework for Network Co-Simulation by Hansen, Jacob, Edgar, Thomas, Daily, Jeff, Wu, Di

    Published in 2017 American Control Conference (ACC) (01-05-2017)
    “…With an ever-evolving power grid, concerns regarding how to maintain system stability, efficiency, and reliability remain constant because of increasing…”
    Get full text
    Conference Proceeding
  4. 4

    Model-driven Deception for Control System Environments by Hofer, William, Edgar, Thomas, Vrabie, Draguna, Nowak, Kathleen

    “…Deception techniques are a useful defensive mechanism that could be very valuable in control systems where updates and patches can be difficult. However, to…”
    Get full text
    Conference Proceeding
  5. 5
  6. 6

    Development of a Host-Based Intrusion Detection and Control Device for Industrial Field Control Devices by Rice, Theora R., Seppala, Garret, Edgar, Thomas, Choi, Eric, Cain, Daniel, Mahserejian, Shant

    Published in 2019 Resilience Week (RWS) (01-11-2019)
    “…Industrial control systems contain a multitude of devices deployed into the field to observe and control a physical process. Currently, most of these devices…”
    Get full text
    Conference Proceeding
  7. 7
  8. 8
  9. 9
  10. 10

    Applying the scientific method to cybersecurity research by Tardiff, Mark F., Bonheyo, George T., Cort, Katherine A., Edgar, Thomas W., Hess, Nancy J., Hutton, William J., Miller, Erin A., Nowak, Kathleen E., Oehmen, Christopher S., Purvine, Emilie A. H., Schenter, Gregory K., Whitney, Paul D.

    “…The cyber environment has rapidly evolved from a curiosity to an essential component of the contemporary world. As the cyber environment has expanded and…”
    Get full text
    Conference Proceeding
  11. 11

    A hybrid Authentication and authorization process for control system networks by Manz, David O., Edgar, Thomas W., Fink, Glenn A.

    “…This paper presents a new authentication protocol for control systems that draws from Extensible Authentication Protocol and Kerberos. Traditional…”
    Get full text
    Conference Proceeding
  12. 12
  13. 13
  14. 14
  15. 15