^Langehaug, T.J., Graham, S.R., “CuMONITOR: Continuous Monitoring of Microarchitecture for Software Task Identification and Classification”, ACM Digital Threats: Research and Practice, to Appear
^Rose, A., Graham, S.R., Schubert-Kabban, C., “ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments”, MDPI Cyber to Appear
^Rose, A., Graham, S.R., “IronNetInjector: Weaponizing .NET Dynamic Language Runtime Engines”, ACM Digital Threats: Research and Practice, vol. 4, issue 3, no. 4, pp. 1-23
*Bada, A.S., Sweeney, P.J., Graham, S.R., Dill, R., “Taint-Assisted Fuzzing for Emulated Avionics Systems”, Journal of DoD Research and Engineering, vol. 5, no. 4, pp. 230-242, Dec 2022.
*Barrett, M.M., Jacques, D.R., Engle, R.D.L., Cox, A.M., Graham, S.R., “Employing a Reference Architecture for Small Unmanned Aerial Systems Cybersecurity Assessment, vol. 5, no. 4, pp. 54-66, Dec 2022.
^Koranek, D.F., Graham, S.R., Borghetti, B.J., Henry, W.C., “Identification of Return-Oriented Programming Attacks Using RISC-V Instruction Trace Data”, in IEEE Access, vol. 10, pp. 45347-45364, 2022
^Langehaug, T.J., Graham, S.R., Schubert Kabban, C., Borghetti, B.J., “MADFAM: MicroArchitectural Data Framework And Methodology”, in IEEE Access, vol. 10, pp. 23511-23531, 2022
^Llewellyn, L.C., Grimaila, M.R., Hodson, D.D., Graham, S.R., “A Metric for Quantifying Nonlinearity in k-Dimensional Complex-Valued Functions”, Journal of Defense Modeling and Simulation, March 2022
^Simon, P.E., Graham, S.R., “Extending the Quality of Secure Service Model to Multi-Hop Networks”, MDPI Journal of Cybersecurity and Privacy, vol. 1, no. 4, pp. 793-803, Dec 2021.
*Arnold, C.M, Nykl, S.L., Graham, S.R., Leishman, R.C., “Real-Time Structure from Motion with Planar Homography Estimation: A Real-Time Low-Bandwidth High-Resolution Variant for Aerial Reconnaissance.” Journal of Defense Modeling and Simulation, pp. 1-12, Dec 2021
^Simon, P.E., Graham, S.R., Talbot, C.M, Hayden, M.J, “Model for Quantifying the Quality of Secure Service”, MDPI Journal of Cybersecurity and Privacy, vol. 1, no. 2, pp. 289–301, May 2021.
^Langehaug, T.J., Borghetti, B.J., Graham, S.R., “Classifying Co-Resident Computer Programs Using Information Revealed by Resource Contention”, ACM Digital Threats: Research and Practice, May 2021
*Tullos, J.C., Graham, S.R., Jordan, J.D., Patel, P.P., “SPARC: Statistical Performance Analysis with Relevance Conclusions”, IEEE Open Journal of the Computer Society, vol 2, pp. 117-129, Feb 2021
*Pettit, D.M., Graham, S.R., Sweeney, P.J., “Searching for Stars: Analyzing and Defining UAV Cyber Risk Assessments”, International Journal on Advances in Security, vol 13, no 1&2, Jul 2020
^Hamilton, N.S., Graham, S.R., Carbino, T.J., Petrosky, J.C., Betances, J.A., “Adaptive-Hybrid Redundancy with Error Injection”, MDPI Journal of Electronics, vol 8, no 11, p. 1266, Nov 2019
*Roeber J. B., Nykl, S.L., Graham, S.R., “Assessment of Structure from Motion for Reconnaissance Augmentation and Bandwidth Usage Reduction”, Journal of Defense Modeling and Simulation, vol 1, pp. 1-13, Apr 2019
^Badenhop, C.W., Graham, S.R., Mullins, B.E., Mailloux, L.O., “Looking Under the Hood of Z-Wave: Volatile Memory Introspection for the ZW0301 Transceiver”, ACM Transactions on Cyber-Physical Systems, vol 3, issue 2, pp. 1-24, Mar 2019
*Beyer, S.M., Mullins, B.E., Graham, S.R., Bindewald, J.M., “Pattern-of-Life Modeling in Smart Homes”, IEEE Internet of Things Journal, vol 5, issue 6, pp. 5317-5325, Dec 2018
*Gutierrez, J.A., Bindewald, J.M., Graham, S.R., Rice, M.J., “Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections”, International Journal of Critical Infrastructure Protection, vol 18, pp. 58-70, Sep 2017
*Reber, P.E., Graham, S.R., “Evaluating System on a Chip Design Security”, Journal of Information Warfare, vol 16, issue 3, Summer 2017
^Badenhop, C.W., Graham, S.R., Ramsey, B.W., Mullins, B.E., Mailloux, L.O., “The Z-Wave Routing Protocol and its Security Implications”, ElsevierJournal of Computers & Security, vol 68, pp. 112-129, Jul 2017
*Harmon, D.F., *Reynolds, M.B., Graham, S.R., Hopkinson, K.M., “Integrating Disruption Prone Links Into Reliable Networks – A TCP Friendly Approach”, IET Communications, vol 6, issue 12, pp. 1702-1709, Aug 2012
*Stuckey, N.C., Vasquez, J.R., Graham, S.R., Hopkinson, K.M., Maybeck, P.S., “Stochastic Control of Computer Networks”, IET Control Theory and Applications, vol 6, issue 3, pp. 403-411, Feb 2012
^Freris, N., ^Graham, S.R., Kumar, P.R., “Fundamental limits on synchronizing clocks over networks”, IEEE Transactions on Automatic Control, vol 56, no 2, pp. 1352-1364, Jun 2011
*Llewellyn, L.C., Hopkinson, K.M., Graham, S.R., “Distributed Fault-Tolerant Quality of Wireless Networks.” IEEE Transactions on Mobile Computing, vol 10, no 2, pp. 175-190, Feb 2011
*Coates, G.M., Hopkinson, K.M., Graham, S.R., Kurkowski, S.H., “A Trust System Architecture for SCADA Network Security”, IEEE Transactions on Power Delivery, vol 25, issue 1, pp. 158-169, Jan 2010
^Ford, T.C., Colombi, J.M., Jacques, D.R., Graham, S.R., “A General Method of Measuring Interoperability and Describing Its Impact on Operational Effectiveness.” Journal of Defense Modeling and Simulation, Jul 2009
^Graham, S.R., ^Baliga, G.B., Kumar P.R., “Abstractions, Architecture, Mechanisms, and a Middleware for Networked Control.” IEEE Transactions on Automatic Control, vol 54, no 7, pp. 1490-1503, Jul 2009
^Ford, T.C., Colombi, J.M., Jacques, D.R., Graham, S.R., “On the Application of Classification Concepts to Systems Engineering Design and Evaluation.” Journal of Systems Engineering, vol 12, no 2, 2009
*Coates, G. M., Hopkinson, K.M., Graham, S.R., Kurkowski, S.H., “Collaborative, Trust-Based Security Mechanisms for a National Utility Intranet.” IEEE Transactions on Power Systems, vol 23, no 3, Aug 2008
Refereed Conference Papers
*Culbreth, S.P., Graham, S.R., “Demonstrating Redundancy Advantages of a Three-Channel Communication Protocol”, 18th International Conference on Cyber Warfare and Security (ICCWS 2023), Baltimore, MD, Mar 2023
^Langehaug, T.J., Graham, S.R., “Towards Hardware-Based Application Fingerprinting with Microarchitectural Signals for Zero Trust Environments”, Proceedings of the 56th Hawaii International Conference on System Sciences, Manoa, Hawaii, Jan 2023
^Simon, P.E., Graham, S.R., “Probability of Data Leakage and its Impacts on Confidentiality”, 21st European Conference on Cyber Warfare and Security (ECCWS 2022), UK, Jun 2022
*Chadwick, S.D., Graham, S.R., Dean, J.W., Dallmeyer M.J., “Leveraging Confidential Computing to Enable Secure Information Sharing”, 16th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2022
*Diamond, N.B., Graham, S.R., Clark, G.J., “Securing InfiniBand Traffic with the Bluefield-2 DPU”, 16th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2022
*Muramoto, C.M., Graham, S.R., ^Dunlap, S.J., “Boot Image Encryption on the Talos II”, 16th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2022
*Chadwick, S.D., Graham, S.R., Dean, J.W., “Performance Implications for Multi-Core RISC-V Systems with Dedicated Security Hardware”, 17th International Conference on Cyber Warfare and Security (ICCWS 2022), Albany, NY, Mar 2022
*Diamond, N.B., Graham, S.R., Clark, G.J., “Securing IBA with the Bluefield-2 DPU”, 17th International Conference on Cyber Warfare and Security (ICCWS 2022), Albany, NY, Mar 2022
*Muramoto, C.M., ^Dunlap, S.J., Graham, S.R., “Improving Hardware Security on Talos II Architecture Through Boot Image Encryption”, 17th International Conference on Cyber Warfare and Security (ICCWS 2022), Albany, NY, Mar 2022
*Hintze, K.D., Graham, S.R., Dunlap, S.J., Sweeney, P.J., “InfiniBand Network Monitoring: Challenges and Possibilities”, 15th International Conf on Crit Infrastructure Protection, Arlington, VA, USA, Mar 2021
*Mellish, R.W., Graham, S.R., Dunlap, S.J., Sweeney, P.J., “Anomaly Detection in Automation Controllers”, 15th International Conf on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2021
*Tullos, J.C., Graham, S.R., Patel, P.P., “Applied Analytical Model for Latency Evaluation of RISC-V Security Monitor”, 16th International Conference on Cyber Warfare and Security (ICCWS 2021), Cooksville, TN, Feb 2021
#^Koranek, D.F., Hodson, D.D., Graham, S.R., “Zynq System-on-Chip DMA Messaging for Processor Monitoring”, 16th Intern’l Conf on Cyber Warfare and Security (ICCWS 2021), Cooksville, TN, Feb 2021
Mellish, R.W., Graham, S.R., Dunlap, S.J.,“Network Forensics for Encrypted SCADA Device Programming Traffic”, 16th International Conf on Cyber Warfare and Security (ICCWS 2021), Cooksville, TN, Feb 2021
#*Willburn, R.A., Graham, S.R., “Remote Memory Monitoring for Malware in a Talos II Architecture”, 16th International Conference on Cyber Warfare and Security (ICCWS 2021), Cooksville, TN, Feb 2021
*Crow, D.R., Graham, S.R., Borghetti, B.J., Sweeney, P.J., “Empirical Dynamic Modeling as a Component of an Intrusion Detection System”, 14th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2020
*Hayden, M.J, Graham, S.R., Betances, J.A., Mills, R.F., “Multi-Channel Security through Data Fragmentation”, 14th International Conf on Crit Infrastructure Protection, Arlington, VA, USA, Mar 2020
*Mireles, L.E., Graham, S.R., Dunlap, S.J., Sweeney, P.J., Dallmeyer M.J., “Implications of Securing and Infiniband Network”, 14th Intrntl Conf on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2020
*Pettit, D.M., Graham, S.R., “Cybersecurity Risk Assessment for Small Unmanned Aerial Vehicles”, 14th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2020
*Crow, D.R., Graham, S.R., Borghetti, B.J., “Fingerprinting Vehicles with CAN Bus Data Samples”, 15th International Conference on Cyber Warfare and Security (ICCWS 2020), Norfolk, VA, Feb 2020
*Pettit, D.M., Dill, R., Graham, S.R., “Zero Stars: Analysis of Cybersecurity Risk of Small COTS UAVs”, IARIA SECUREWARE 19, Nice, France, Oct 2019
^Hamilton, N.S., Graham, S.R., Carbino, T.J., Petrosky, J.C., Betances, J.A., “Adaptive-Hybrid Redundancy for Rad-Hardening”, Proceedings of the IEEE 2019 National Aerospace and Electronics Conference (NAECON), IEEE, Jul 2019
*Cintron, L.A., Graham, S.R., Hodson, D.D., Mullins, B.E. “Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure using Hyperledger Fabric”, 13th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2019
*Hacker, K.L., Graham, S.R., Dunlap, S.J., “Vehicle Identification and Route Reconstruction via TPMS Data Leakage”, 13th International Conf on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2019
*Lassiter, R. M., Graham, S.R., Carbino, T.J., Dunlap S.J., “Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes (WS-DNA)”, 13th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2019
*Schmitt, D.J., Graham, S.R., Sweeney, P.J., Mills, R.F., “A Cyber Vulnerability Assessment of Infiniband Networking”, 13th International Conf on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2019
*Cintron, L.A., Graham, S.R., Hodson, D.D., Mullins, B.E., “Distributed-Ledger Based Event Attestation for Intelligent Transportation Systems”, 14th International Conference on Cyber Warfare and Security (ICCWS 2019), Stellenbosch, South Africa, Mar 2019
*Hacker, K.L., Graham, S.R., “Preserving Privacy and Integrity in Automotive Tire Sensors”, 14th International Conf on Cyber Warfare and Security (ICCWS 2019), Stellenbosch, South Africa, Mar 2019
^Nolan, B.C., Graham, S.R., Mullins, B.E., Schubert-Kabban, C.M., “Unsupervised Time Series Extraction from Controller Area Network Payloads”, 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, pp. 1-5, 2018
*Beyer, S.M., Mullins, B.E., Graham, S.R., Bindewald, J.M., “Pattern-of-Life Modeling Using Data Leakage in Smart Homes”, SCI-300 Specialists’ Meeting (SM) on ‘Cyber Physical Security of Defense Systems’, Fort Walton Beach, FL, USA, May 2018
*Willis, J.M., Mills, R.F., Mailloux, L.O., Graham, S.R., “MIL-STD-1553 Device Characterization using Organic Interface Functionality”, SCI-300 Specialists’ Meeting (SM) on ‘Cyber Physical Security of Defense Systems’, Fort Walton Beach, FL, USA, May 2018
*Jeffries, B.M., Mullins, B.E., Graham, S.R., “Securing Critical Infrastructure: A Ransomware Study”, 12th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2018
*Celebucki, D.J., Graham, S.R., Gunawardena, S., “Reversing A Lattice ECP3 FPGA for Bitstream Protection”, 12th International Conf on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2018
*Bentjen, K.C., Graham, S.R., Nykl, S.L., “Introducing Persistent Human Control into a Reservation-Based Autonomous Intersection Protocol”, 12th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2018
*Wolfe, C.L., Graham, S.R., Mills, R.F., Nykl, S.L., Simon, P.E., “Securing Data-in-Transit for Power-Limited Sensor Networks using Two-Channel Communication”, 12thInternational Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2018
*Wolfe, C.L., Graham, S.R., Simon, P.E. “Securing Data in Transit using Tunable Two Channel Communication”, 13th International Conf on Cyber Warfare and Security (ICCWS 2018), Washington, DC, USA, Mar 2018
*Connors, J.W., Graham, S.R., Mailloux, L.O., “Cyber Synthetic Modeling for Vehicle-to-Vehicle Applications”, 13th International Conf on Cyber Warfare and Security (ICCWS 2018), Washington, DC, USA, Mar 2018
*Bentjen, K.C., Graham, S.R., Nykl, S.L. “Modelling Misbehaviour in Automated Vehicle Intersections in a Synthetic Environment”, 13th International Conference on Cyber Warfare and Security (ICCWS 2018), Washington, DC, USA, Mar 2018
*Celebucki, D.J., Lin, A.C., Graham, S.R., “A Security Evaluation of Popular Internet of Things Protocols for Manufacturers”, 2018 IEEE International Conference on Consumer Electronics (ICCE), Jan 2018
*Willis, J.M., Mills, R.F., Mailloux, L.O., Graham, S.R., “Considerations for secure and resilient satellite architectures”, 2017 International Conference on Cyber Conflict (CyCon U.S.), Washington, DC, USA, pp. 16-22, 2017
^Simon, P.E., Graham, S.R., “Potential Privacy Ramifications of Modern Vehicle Software and Firmware”, 12th European Conference on Cyber Warfare and Security (ECCWS 2017), Estonia, Jun 2017
*Gutierrez, J.A., Bindewald, J.M., Graham, S.R., Rice, M.J., “Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections”, International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2017
*Potthoff, T.S., Graham, S.R., “Dynamic Attestation of Real-Time Systems”, 12th International Conference on Cyber Warfare and Security (ICCWS 2017), Fairborn, OH, USA, Mar 2017
*Caberto, E.K., Graham, S.R., “A Method of Securing a Vehicle’s Controller Area Network”, 12th International Conference on Cyber Warfare and Security (ICCWS 2017), Fairborn, OH, USA, Mar 2017
*Reber, P.E., Graham, S.R., “Security by Design in System on a Chip Applications”, 12th International Conference on Cyber Warfare and Security (ICCWS 2017), Fairborn, OH, USA, Mar 2017
^Simon, P.E., Graham, S.R., “Comparison of Real-Time, Mobile Data Bus Architectures”, 3rd International Workshop on Information Integration in Cyber Physical Sys (IICPS 2016), Jul 2016
*Coates, G.M., Hopkinson, K.M., Graham, S.R., Kurkowski, S.H., Collaborative, Trust-Based Security Mechanisms for a Regional Utility Intranet, IEEE General Power Meeting, Alberta, Canada, p. 1, Jul 2009
*Coyne, M.E., Graham, S.R., Hopkinson K.M., Kurkowski, S.H., “A Methodology for Unit Testing Actors in Proprietary Discrete Event Based Simulations.” Winter Simulation Conference, pp. 1012-1019, Miami, FL, USA, Dec 2008
*Belue, J.M., Kurkowski, S.H., Graham, S.R., Hopkinson, K.M., Thomas, R.W., *Abernathy, J.W., “Research and Analysis of Simulation-based Networks through Multi-Objective Visualization.” Winter Simulation Conference, Miami, FL, USA, pp. 1216-1224, Dec 2008
*Compton, M.D., Hopkinson, K.M., Graham, S.R., “The Network Tasking Order (NTO).” Military Communications Conference, San Diego, CA, USA, pp. 1-7, Nov 2008
^Ford, T.C., Colombi, J.M., Jacques, D.R., Graham, S.R., “Measuring system interoperability: An i-Score Improvement.” Proceedings of the 6th Annual Conference on Systems Engineering Research, Redondo Beach, CA, USA, Apr 2008
^Ford, T.C., Colombi, J.M., Jacques, D.R., Graham, S.R., “A Survey on Interoperability Measurement.” Proceedings of the 12th International Command and Control, Research and Technology Symposium, Newport, RI, USA, Jun 2007
^Kleeman, M.P., Lamont, G.B., Hopkinson, K.M., Graham, S.R., “Solving Multicommodity Capacitated Network Design Problems using a Multiobjective Evolutionary Algorithm.” Proceedingsof the 2007 IEEE Computational Intelligence for Security and Defense Applications, Honolulu, HI, USA, pp. 33-41, Apr 2007
^Ford, T.C., Colombi, J.M., Jacques, D.R., Graham, S.R., “The Interoperability Score.” Proceedings of 5th Annual Conf on Systems Engineering Research, Hoboken, NJ, USA, Mar 2007
*Stuckey, N.C., Vasquez, J.R., Graham, S.R., “Estimating Queue Size in a Computer Network Using an Extended Kalman Filter.” Proceedings of the 2007 IEEE Aerospace Conf, Big Sky, MT, USA, Mar 2007
*Kautz, J.T., Mullins, B.E., Baldwin, R.O., Graham. S.R., “An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks.” Hawaii International Conference on System Sciences (HICSS-40), Waikoloa, HI, USA,pp. 1-6, Jan 2007
^Kowshik S., ^Baliga, G.B., ^Graham, S.R., Sha L., “Co-Design Based Approach to Improve Robustness in Networked Control Systems.” Proceedings of the International Conference on Dependable Systems and Networks, Jun 2005
^Robinson, C.L., ^Baliga, G.B., ^Graham. S.R., Kumar, P.R., “Design patterns for robust and evolvable networked control.” Proceedings of 3rd Annual Conf on Systems Engineering Research, NJ, USA, Mar 2005
^Graham, S.R., Kumar, P.R., “Time in general-purpose control systems: The control time protocol and an experimental evaluation.” Proceedings of the 43rd IEEE Conference on Decision and Control, pp. 4004–4009, Bahamas, 14-17 Dec 2004
^Baliga, G.B., ^Graham, S.R., Sha L., Kumar, P.R., “Service continuity in networked control using Etherware.” IEEE Distributed Systems Online, Sep 2004
^Baliga, G.B., ^Graham, S.R., Sha L., Kumar, P.R., “Etherware: Domainware for wireless control networks.” Proceedings of the 7th IEEE International Symposium on Object-oriented Realtime distributed Computing (ISORC 2004), pp. 155–162, Vienna, Austria, 12-14 May 2004
Invited Conference Papers
^Baliga, G.B., ^Graham, S.R., Gunter, C., Kumar, P.R., “Reducing Risk by Managing Software Related Failures in Networked Control Systems.” Proceedings of the 45th IEEE Conference on Decision and Control, San Diego, CA, pp. 2866-2871, Dec 2006
^Baliga, G.B., ^Graham, S.R., Kumar, P.R., “Middleware and Abstractions in the Convergence of Control with Communication and Computation.” 44th IEEE Conf on Decision and Control, Seville, Spain, Dec 2005
^Graham, S.R., ^Baliga, G.B., Kumar, P.R., “Issues in the convergence of control with communication and computation: Proliferation, architecture, design, services, and middleware.” Proceedings of 43rd IEEE Conf on Decision Control, Nassau, Bahamas, pp. 1466-1471, Dec 2004
^Graham, S.R., Kumar, P.R., “The Convergence of Control with Communication and Computation.” Proceedings of the Eighth International Conf on Personal Wireless Communication, pp. 458-475, Sep 2003
Book Chapters
*Muramoto, C.M., Graham, S.R., Dunlap, S.J., “Evaluating the Use of Boot Image Encryption on Talos II Architecture”, Critical Infrastructure Protection XVI, Springer, Cham, Switzerland, 2022
*Crow, D.R., Graham, S.R., Borghetti, B.J., Sweeney, P.J., “Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems”, Critical Infrastructure Protection XIV, Springer, Cham, Switzerland, pp. 111-133, 2020
*Hayden, M., Graham, S.R., Betances, J.A., Mills, R.F., “Multi Channel Security through Data Fragmentation”, Critical Infrastructure Protection XIV, Springer, Cham, Switzerland, pp. 137-155, 2020
*Mireles, L.E., Graham, S.R., Sweeney, P.J., Dunlap, S.J., Dallmeyer, M.J., “Securing an Infiniband Network and its Effect on Performance”, Critical Infrastructure Protection XIV, Springer, Cham, Switzerland, pp. 157-179, 2020
*Pettit, D.M., Graham, S.R., “Assessing the Cyber Risk of Small Unmanned Aerial Vehicles”, Critical Infrastructure Protection XIV, Springer, Cham, Switzerland, pp. 45-67, 2020
*Magness, J.M., Sweeney, P.J., Graham, S.R., Kovach, N.S., “Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles”, Critical Infrastructure Protection XIV, Springer, Cham, Switzerland, pp. 25-44, 2020
*Cintron, L.A., Graham, S.R., Hodson, D.D., Mullins, B.E., “Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure using Hyperledger Fabric”, Critical Infrastructure Protection XIII, Springer, Cham, Switzerland, pp. 137-156, 2019
*Lassiter, R. M., Graham, S.R., Carbino, T.J., Dunlap S.J., “Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes (WS-DNA)”, Critical Infrastructure Protection XIII, Springer, Cham, Switzerland, pp. 103-121, 2019
*Hacker, K.L., Graham, S.R., Dunlap, S.J., Vehicle Identification and Route Reconstruction via TPMS Data Leakage, Critical Infrastructure Protection XIII, Springer, Cham, Switzerland, pp. 123-136, 2019