Zobrazeno 1 - 10
of 40
pro vyhledávání: '"Thomas E. Carroll"'
Publikováno v:
IEEE Access. 9:57565-57577
Because the research area of resilient control systems was pioneered during the last decade, the basis and benchmarking of resilience have continued to mature to achieve what has long been understood as the ultimate benefit of resilience. However, th
Autor:
Thomas E. Carroll, Richard M. Pratt
Publikováno v:
ICCE
The electric vehicle charging infrastructure supports Plug-in Electric Vehicle (PEV) refueling through vehicle charging equipment (EVSE). Communication and control methods are being developed and tested to respond to growing PEV electrical load and e
Publikováno v:
Human Interface and the Management of Information. Interaction, Visualization, and Analytics ISBN: 9783319920429
HCI (4)
HCI (4)
A key aspect of computer network defense and operations is the characterization of network behaviors. Several of these behaviors are a result of indirect interactions between various networked entities and are temporal in nature. Modeling them requir
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f3136547c4f3cd433c7124736d965349
https://doi.org/10.1007/978-3-319-92043-6_49
https://doi.org/10.1007/978-3-319-92043-6_49
Publikováno v:
2017 IEEE International Symposium on Technologies for Homeland Security (HST).
Enterprise networks of scale are complex, dynamic computing environments that respond to evolving business objectives and requirements. Characterizing system behaviors in these environments is essential for network management and cybersecurity operat
Autor:
Thomas E. Carroll, Lori Ross O'Neil, Greg Sheets, Philip G. Evans, Richard M. Pratt, John Paul Jones, Jason D. Bonior, William Hutton, Toby Flynn
Publikováno v:
WCNC
DOE / OSTI
DOE / OSTI
Secure time transfer is critical for many time- sensitive applications. The Global Positioning System (GPS) which is often used for this purpose has been shown to be susceptible to spoofing attacks. Quantum Key Distribution (QKD) offers a way to secu
Autor:
Daniel Grosu, Thomas E. Carroll
Publikováno v:
Journal of Parallel and Distributed Computing. 72:389-401
The underlying assumption of Divisible Load Scheduling (DLS) theory is that the processors composing the network are obedient, i.e., they do not ''cheat'' the scheduling algorithm. This assumption is unrealistic if the processors are owned by autonom
Publikováno v:
SmartGridComm
Flexibility from residential loads presents an enormous potential to provide various services to the smart grid. In this paper, we propose a unified hierarchical framework for aggregation and coordination of various residential loads in a smart commu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9030be1de8ea8e7f112a33d4e681823b
https://zenodo.org/record/1280294
https://zenodo.org/record/1280294
Autor:
Thomas E. Carroll, Patrick Paulson, Elena S. Peterson, Seth R. Thompson, Jeffrey L. Jensen, Glenn A. Fink, Christopher S. Oehmen, Daniel M. Best, Christine F. Noonan
Publikováno v:
SafeConfig@CCS
As cyber attacks on enterprise systems and critical infrastructure increase in prevalence and severity, persistent presence of adversaries in these systems is a common theme. While there are many efforts and tools focused on locating and removing adv
Autor:
Daniel Grosu, Thomas E. Carroll
Publikováno v:
Security and Communication Networks. 4:1162-1172
We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot or by disguising
Autor:
Thomas E. Carroll, Daniel Grosu
Publikováno v:
Journal of Network and Computer Applications. 32:599-606
Despite the massive improvements in technology the goal of having accurate, anonymous and voter-verifiable elections has not yet been realized. The existing electronic voting schemes that provide secret voter-verifiable receipts are based on ''classi