Thomas Edgar
Cited by
Cited by
Research methods for cyber security
TW Edgar, DO Manz
Syngress, 2017
Securing wide area measurement systems
MD Hadley, JB McBride, TW Edgar, LR O’Neil, JD Johnson
US Department of Energy, 2007
Predictive modelling for insider threat mitigation
FL Greitzer, P Paulson, L Kangas, LR Franklin, TW Edgar, DA Frincke
Pacific Northwest National Laboratory, Richland, WA, Tech. Rep. PNNL …, 2009
Evaluating transactive controls of integrated transmission and distribution systems using the framework for network co-simulation
J Hansen, T Edgar, J Daily, D Wu
2017 American Control Conference (ACC), 4010-4017, 2017
Towards an experimental testbed facility for cyber-physical security research
T Edgar, D Manz, T Carroll
Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011
Realizing scientific methods for cyber security
TE Carroll, D Manz, T Edgar, FL Greitzer
Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012
AGA-12, Part 2 Performance Test Results
MD Hadley, KA Huston, TW Edgar
Pacific Northwest National Laboratories, 2007
Security and privacy in cyber-physical systems
GA Fink, TW Edgar, TR Rice, DG MacDonald, CE Crawford
Cyber-Physical Systems, 129-141, 2017
Extracting dependencies between network assets using deep learning
TE Carroll, S Chikkagoudar, TW Edgar, KJ Oler, KM Arthur, DM Johnson, ...
US Patent App. 14/548,159, 2016
Overview of security and privacy in cyber-physical systems
GA Fink, TW Edgar, TR Rice, DG MacDonald, CE Crawford
Security and Privacy in Cyber‐Physical Systems: Foundations, Principles and …, 2017
Experiment as a service
TW Edgar, TR Rice
2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017
Serial Communication Tapping and Transmission to Routable Networks
TW Edgar, SJ Zabriskie, EY Choi
US Patent App. 14/038,069, 2014
Applying the scientific method to cybersecurity research
MF Tardiff, GT Bonheyo, KA Cort, TW Edgar, NJ Hess, WJ Hutton, ...
2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-8, 2016
Enabling collaborative research for security and resiliency of energy cyber physical systems
A Hussain, T Faber, R Braden, T Benzel, T Yardley, J Jones, DM Nicol, ...
2014 IEEE International Conference on Distributed Computing in Sensor …, 2014
Systems and Methods for Securing Control Systems
SL Clements, TW Edgar, MD Hadley
US Patent App. 12/425,979, 2010
Challenges of Cybersecurity Research in a Multi-User Cyber-Physical Testbed
T Edgar, T Carroll, D Manz
NIST Cybersecurity in Cyber-Physical Systems Workshop, April, 23-24, 2012
Challenges of cybersecurity research in a multi-user testbed
T Edgar, T Carroll, D Manz
Pacific Northeast National Laboratory, 2012
A hybrid Authentication and authorization process for control system networks
DO Manz, TW Edgar, GA Fink
2010 Sixth International Conference on Information Assurance and Security, 36-39, 2010
Development of a Host-Based Intrusion Detection and Control Device for Industrial Field Control Devices
TR Rice, G Seppala, T Edgar, E Choi, D Cain, S Mahserejian
2019 Resilience Week (RWS) 1, 105-111, 2019
A multi-level fidelity microgrid testbed model for cybersecurity experimentation
A Ashok, S Sridhar, T Becejac, T Rice, M Engels, S Harpool, M Rice, ...
12th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 19), 2019
The system can't perform the operation now. Try again later.
Articles 1–20