Publications on Information Assurance / Cybersecurity Ph.D. Dissertations - Master’s Theses - Book / Book Chapters - Encyclopedia Articles - Journal Articles - Conference Papers On this page you can find Ph.D. Dissertations, Master's Theses, Journal Articles, Conference Papers and other publications of our CCRE team members, affiliated Faculty and students from the past five years. Ph.D. Dissertations Wright, Shelton, "A high-speed simulation and cybersecurity regression testing platform for industrial control systems" (2023). Dissertations. 351. https://louis.uah.edu/uah-dissertations/351 Maxwell, Katia P., "Selecting and composing cyberattack component models" (2022). Dissertations. 246. https://louis.uah.edu/uah-dissertations/246 Cantrell, Walter Alan, "Verification and validation methods for extended petri nets modeling cyberattacks" (2021). Dissertations. 221. https://louis.uah.edu/uah-dissertations/221 Elbasher ElMahdi, Ph.D. Dissertation, May 2021,“Secure data integrity in wireless ad hoc networks”. Sakib, Mohammad Sadman, "Hardware security primitives using NAND flash memory" (2021). Dissertations. 223. https://louis.uah.edu/uah-dissertations/223 Prawar Poudel, Ph.D. dissertation, Spring 2021, "Exploiting Physical Properties of Flash Memories for Enhancing Security and Energy-Efficiency of Embedded Systems". Das, Rishabh, "An embedded defense-in-depth module for detecting cyberattacks on interdependent SCADA controllers" (2020). Dissertations. 204. https://louis.uah.edu/uah-dissertations/204 Werth, Aaron W., "Evaluation of an embedded process prediction intrusion prevention system for industrial control systems" (2020). Dissertations. 230. https://louis.uah.edu/uah-dissertations/230 Griffith, SueAnne Nichole, "A virtual cyber-physical system testbed for use in network intrusion detection and prevention system verification" (2020). Dissertations. 205. https://louis.uah.edu/uah-dissertations/205 K. Sharshembiev, “Protocol Misbehavior Mitigation Framework for Broadcast Communications in Vehicular Ad Hoc Networks,” November, 2019 Murbach, Kyle, "Self-Efficacy in Information Security: A Mixed Methods Study of Deaf End-Users" (2019). Masters Theses & Doctoral Dissertations, https://scholar.dsu.edu/theses/335. Master’s Theses Igor Semenov, An Implementation of ChaCha20 Stream Cypher in All-Programmable SoCs, Master Thesis, The University of Alabama in Huntsville, July 2020. Book/Book Chapters Debashri Roy, Tathagata Mukherjee, Eduardo Pasiliao \Exploiting Spatio-temporal Correlation in RF Data using Deep Learning" Book Chapter: Deep Learning Applications Volume 2, 2020, Publisher Springer J. A. Bland, C. D. Colvett, W. A. Cantrell, K. P. Mayfield, M. D. Petty, and T. S. Whitaker, “Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs”, in K. R. Choo, T. H. Morris, and G. L. Peterson (Editors), National Cyber Summit (NCS) Research Track, Advances in Intelligent Systems and Computing, Vol. 1055, Springer, Cham Switzerland, 2020 pp. 232-247, doi:10.1007/978-3-030-31239-8_18. Encyclopedia Articles Alim M.E., Smalligan J., Oliveira R.F.B., Griffith S.A., Morris T.H. (2021) "Cyber-Physical System". In: Jajodia S., Samarati P., Yung M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg Williams, T., El-Gayar, O., Morris, T. "Security Analytics," in Encyclopedia of Cryptography, Security and Privacy, Springer US, 2020. Hairston, J., Gaede, R., Morris, T. "Industrial Internet of Things," in Encyclopedia of Cryptography, Security and Privacy, Springer US, 2020. SueAnne Griffith, Thomas H. Morris, "Network Intrusion Detection System," Encyclopedia of Cryptography, Security, and Privacy, 2020. Journal Articles 2023 Gupta, Shivangi, Baudry, Jerome, Menon, Vineetha. (2023). Big Data analytics for improved prediction of ligand binding and conformational selection. Frontiers in Molecular Biosciences. 9. 953984. 10.3389/fmolb.2022.953984. Pulivarti R, Martin N, Byers F, Wagner J, Maragh S, Wilson K, Wojtyniak M, Kreider B, Frances A, Edwards S, Morris T, Sheldon J, Ross S, Whitlow P (2023) Cybersecurity of Genomic Data. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8432. https://doi.org/10.6028//NIST.IR.8432 Werth, A., Morris, T., A digital twin internal to a PLC to detect malicious commands and ladder logic that potentially cause safety violations. Journal of Cyber Security Technology, February 2023, http://dx.doi.org/10.1080/23742917.2023.2171538 2022 Chaity Banerjee, Tharun Kumar Doppalapudi, Eduardo Pasiliao Jr., Tathagata Mukherjee “Camera Identification Using Image Based Deep Feature Signatures” In IEEE Journal of Big Data Mining & Analytics, Volume 5, Number 3, Pages: 206-227, Year 2022 Jianqing Liu, Chi Zhang, Kaiping Xue, Yuguang Fang, “Privacy Preservation in Multi-Cloud Secure Data Fusion for Infectious-Disease Analysis,” IEEE Transactions on Mobile Computing, DOI: 10.1109/TMC.2022.3145745, Jan.2022. 2021 Abel Alex Boozer, Arun John, Tathagata Mukherjee "Internet of Things Software and Hardware Architectures and Their Impacts on Forensic Investigations: Current Approaches and Challenges" In Journal of Digital Forensics, Security and Law, September 2021 Sadman Sakib, Aleksandar Milenković, Biswajit Ray, “Flash-DNA: Identifying NAND Flash Memory Origins Using Intrinsic Array Properties,” IEEE Transactions on Electron Devices, Vol. 68, No: 8, August, 2021, pp. 1-7. doi: 10.1109/TED.2021.3087454. S. Bhatt, T. K. Pham, M. Gupta, J. Benson, J. Park and R. Sandhu, "Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future" in IEEE Access, vol. 9, pp. 107200-107223, 2021, https://doi.org/10.1109/ACCESS.2021.3101218, 2021 Jaehong Park, Ravi Sandhu, Maanak Gupta and Smriti Bhatt, "Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems" in IEEE Access, 2021. https://doi.org/10.1109/access.2021.3126201 Prawar Poudel, Biswajit Ray, Aleksandar Milenković, “Microcontroller Fingerprinting Using Partially Erased NOR Flash Memory Cells,” ACM Transactions on Embedded Computing Systems, Vol. 20, No: 3, Article 26, March 2021. doi: 10.1145/3448271 Jonathan Ebert, Ohad Newton, Jeffery O’Rear, Scott Riley, Jaehong Park (Corresponding Author), and Maanak Gupta. 2021. "Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks" Information 12, no. 10: 390. https://doi.org/10.3390/info12100390 Srivastava, Rohit, Ravi Tomar, Maanak Gupta, Anuj K. Yadav, and Jaehong Park. "Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis" Information 12, no. 8: 310. https://doi.org/10.3390/info12080310, 2021 S. Sakib, Md Raquibuzzaman, M. Wasiolek, K. Hattar, and B. Ray, “Total Ionizing Dose Effects on Physical Unclonable Function from NAND Flash Memory,” IEEE Transactions on Nuclear Science, 2021, vol. 68, no. 7, pp. 1445-1453, 2021. K. Sharshembiev, S.M. Yoo, and E. Elmahdi, “Protocol Misbehavior Detection Framework Using Machine Learning Classification in Vehicular Ad Hoc Networks,” Springer’s Wireless Networks, 27(3), 2103-2118, Feb. 2021 Muthukumaran Ramaburamanian, Chaity Banerjee, Debashri Roy, Eduardo Pasiliao Jr., Tathagata Mukherjee "Exploiting Spatio-Temporal Properties of I/Q Signal Data using 3D Convolution for RF Transmitter Identication" In IEEE Journal of Radio Frequency Identication, January 2021 2020 Hairston, Jesse R.; Williams, Tania; Smith, Derrick W. Ed.D., COMS; Sabados, William T. Ph.D.; and Forney, Steven (2020) "Teaching Cybersecurity to Students with Visual Impairments and Blindness," Journal of Science Education for Students with Disabilities: Vol. 23 : Iss. 1 .DOI: 10.14448/jsesd.12.0007 Available at: https://scholarworks.rit.edu/jsesd/vol23/iss1/7" Werth, A., Griffith, S., Hairston, J., and Morris, T., “Cybersecurity Threats and Experimental Testbed for a Generator System,” The Journal of Defense Modeling and Simulation, 2020 Patnayakuni, N. and R Patnayakuni, “Does Cybersecurity Education Focus on the Right Things? A Professions Based Approach to Cybersecurity Education and the NICE Framework,” Cybersecurity Skills Journal: Practice and Research, (November 2020), 82 -87. J. A. Bland, M. D. Petty, T. S. Whitaker, K. P. Maxwell, and W. A. Cantrell, “Machine Learning Cyberattack and Defense Strategies”, Computers & Security, Volume 92, May 2020, doi:10.1016/j.cose.2020.101738. E. Elmahdi, S.M. Yoo, and K. Sharshembiev, “Secured and Reliable Data Forwarding Using Homomorphic Cryptosystem against Blackhole Attacks in Mobile Ad Hoc Networks,” Elsevier’s Journal of Information Security and Applications, vol. 51 (2020), April 2020. D. J. Coe, J. H. Kulick, A. Milenkovic and L. Etzkorn, "Virtualized In Situ Software Update Verification: Verification of Over-the-Air Automotive Software Updates," IEEE Vehicular Technology Magazine, vol. 15, no. 1, pp. 84-90, March 2020. Debashri Roy, Tathagata Mukherjee, Mainak Chatterjee, Eduardo Pasiliao Jr. "Adaptive Streaming of HD and 360°Videos over Software Defined Radios" In Journal of Pervasive and Mobile Computing, Volume 67 2020 S. Sakib, A. Milenkovic, and B. Ray, “Flash Watermark: An Anti-Counterfeiting Technique for NAND Flash Memories,” IEEE Transaction on Electron Devices, vol. 67, no. 10, pp. 4172–4177, 2020. Sadman Sakib, Aleksandar Milenković, Md Tauhidur Rahman, Biswajit Ray, "An Aging-Resistant NAND Flash Memory Physical Unclonable Function," IEEE Transactions on Electron Devices, Vol. 67, Issue: 3, pp. 937-943, February 2020, doi: 10.1109/TED.2020.2968272 2019 Prawar Poudel, Biswajit Ray, Aleksandar Milenković, "Microcontroller TRNGs Using Perturbed States of NOR Flash Memory Cells," IEEE Transactions on Computers, Vol. 68, No. 2, Feb. 2019, pp. 307-313, doi: 10.1109/TC.2018.2866459. Conference Papers 2024 Williams, T., Daugherty, J. The State of Cybersecurity Programs in High Schools: A Case Study Analysis of The Development, Sustainment, and Inclusiveness. Proceedings of the 57th Hawaii International Conference on System Sciences, January 2024, https://hdl.handle.net/10125/107246 2023 Wright, Shelton & Cannan, Logan & Morris, Thomas. (2023). Development of a High-Speed High-Fidelity SCADA Simulation Framework. 889-894. 10.1109/SoutheastCon51012.2023.10115177. Puckett, Steven & Liu, Jianqing & Yoo, Seong-Moo & Morris, Thomas. (2023). A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators. IEEE Internet of Things Journal. PP. 1-1. 10.1109/JIOT.2023.3304175. Liu, Jianqing & Dong, Shangjia & Morris, Thomas & Fang, Yuguang. (2023). Social Equality-Aware Resource Allocation for Post-Disaster Communication Restoration. 1-10. 10.1109/ICCCN58024.2023.10230184. Murbach, K., Morris, T., Wiersig, F., & Golden, J. (2023, July). Small Satellite System Modeling for Vulnerability Analysis. In 2023 IEEE International Conference on Cyber Security and Resilience (CSR) (pp. 373-380). IEEE. doi: 10.1109/CSR57506.2023.10224948 M. E. Alim, J. Smalligan and T. H. Morris, "A Collection of Datasets and Simulation Frameworks for Industrial Control System Research," SoutheastCon 2023, Orlando, FL, USA, 2023, pp. 96-103, doi: 10.1109/SoutheastCon51012.2023.10115122 Baker, Delores & Beal, Aubrey & Joiner, Laurie & Syed, Tamseel Mahmood. (2023). A Low-Cost Modified Energy Detection-Based Spectrum Sensing Algorithm with GNU Radio for Cognitive Radio. 833-837. 10.1109/SoutheastCon51012.2023.10115163. Md Raquibuzzaman, Aleksandar Milenkovic, Biswajit Ray, “Hide-and-Seek: Hiding Secrets in Threshold Voltage Distributions of NAND Flash Memory Cells,” in the Proceedings of the 15th ACM Workshop on Hot Topics in Storage and File Systems (HotStorage’23), July 9, 2023, Boston, MA, ACM New York, NY, 6 pages. doi: 10.1145/3599691.3603415. S. Puckett, V. Menon, E. Jovanov, "Embedding Artificial Intelligence into Wearable IoMT Systems," Keynote speech at Second Serbian International Conference on Applied Artificial Intelligence (SICAAI), May 2023, Belgrade, Serbia. Praveen, Bishwas & Menon, Vineetha & Mukherjee, Tathagata & Mesmer, Bryan & Gholston, Sampson & Corns, Steven. (2023). An Effective Transfer Learning Based Landmark Detection Framework for UAV-Based Aerial Imagery of Urban Landscapes. 844-850. 10.1109/SoutheastCon51012.2023.10115176. Hauenstein, Jacob & Newman, Timothy. (2023). First Considerations in Computing and Using Hypersurface Curvature for Energy Efficiency. 186-193. 10.24132/CSRN.3301.22. Cappi, Jacob & Lear, Aidan & Hauenstein, Jacob. (2023). DYSCO Vis.: DYnamic Self-Correction for Obstructed Visualizations. 772-778. 10.1109/SoutheastCon51012.2023.10115155. Kulhandjian, Hovannes & Batz, Elizabeth & Garcia, Eduardo & Vega, Selena & Velma, Sanjana & Kulhandjian, Michel & D'Amours, Claude & Kantarci, Burak & Mukherjee, Tathagata. (2023). AI-based RF-Fingerprinting Framework and Implementation using Software-Defined Radios. 143-147. 10.1109/ICNC57223.2023.10074023. 2022 Md Raquibuzzaman, Matchima Buddhanoy, Aleksandar Milenkovic, Biswajit Ray, “Instant Data Sanitization on Multi-Level-Cell NAND Flash Memory,” in the Proceedings of the 15the ACM International Systems and Storage Conference (SYSTOR’22), June 12-15, 2022, Haifa, Israel, ACM New York, NY, 11 pages. doi: 10.1145/3534056.3534941. Nikita Susan Joseph, Chaity Banerjee, Daniel Reasor, Eduardo Pasiliao, Tathagata Mukherjee “Mesh Based Neural Networks for Estimating High Fidelity CFD from Low Fidelity Input” In Proceedings of IEEE SoutheastCon 2022 Hauenstein, Jacob & Newman, Timothy. (2022). Toward Energy Efficient Curvature in Range Images. 263-264. 10.1109/ISM55400.2022.00059. 2021 Alim, M. E.; Wright, S.; Morris, T. “A Laboratory-Scale Spillway SCADA System Testbed for Cybersecurity Research” in Annual Computer Security Applications Conference, ACSAC 2021. Alim, M. E.; Wright, S.; Morris, T. “A Laboratory-Scale Canal SCADA System Testbed for Cybersecurity Research” in Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, IEEE-TPS 2021, https://doi.org/10.1109/TPSISA52974.2021.00038. Alec Riden, Debashri Roy, Eduardo Pasiliao Jr., Tathagata Mukherjee \DeePOE: Deep Learning for Position and Orientation Estimation" In Proceedings of IEEE Asia Pacific Communications Conference 2021 (IEEE APCC 2021) Chaity Banerjee, Chad Lilian, Daniel Reasor, Eduardo Pasiliao, Tathagata Mukherjee \An Application of Generative Adversarial Networks for Robust Inference in Computational Fluid Dynamics" In Proceedings of International Conference on Information Systems & Data Mining 2021 (Published by ACM) Vaidyanath Areyur Shanthakumar, Clark Barnett, Keith Warnick, Putu Ayu Sudyanti, Vitalii Gerbuz, Tathagata Mukherjee "Item Based Recommendation Using Matrix-Factorization-Like Embeddings From Deep Networks" In Proceedings of ACM South East Conference 2021 (Best Research Paper Award) Williams T., El-Gayar O. (2021) Design of a Virtual Cybersecurity Escape Room. In: Choo KK.R., Morris T., Peterson G., Imsand E. (eds) National Cyber Summit (NCS) Research Track 2021. NCS 2021. Lecture Notes in Networks and Systems, vol 310. Springer, Cham. https://doi.org/10.1007/978-3-030-84614-5_6 2020 E. Elmahdi and S.M. Yoo, “Secure Data Integrity in VANETs based on CS-DC Scheme,” IEEE Latin-American Conference on Communications (LATINCOM2020), Nov. 2020. Chaity Banerjee, Tathagata Mukherjee, Eduardo Pasiliao "The Multiphase ReLU Activation Function" In Proceedings of ACM Southeast (ACMSE) Conference 2020 Nikita Susan Joseph, Chaity Banerjee Mukherjee, Eduardo Pasiliao Jr., Tathagata Mukherjee "A Robust Learning Framework For Aircraft Identification Using ADS-B I/Q Information" POSTER Von Braun Symposium 2020 Vaidyanath Areyur Shanthakumar, Chaity Banerjee, Eduardo Pasiliao Jr., Tathagata Mukherjee, "Uncooperative Direction Finding with Neural Networks using I/Q Information" In International Conference on Information Systems & Data Mining 2020 M. Hasan and B. Ray, “Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog Sanitization” 29th USENIX Security Symposium, Boston, MA, Aug. 2020. Sudhir Aggarwal, James Parsons, Shiva Housmand, Tathagata Mukherjee "An Empirical Study on Efficiency of a Dictionary Based Viterbi Algorithm for Word Segmentation" In Proceedings of IEEE BigData 2020 Nikita Susan Joseph, Chaity Banerjee Mukherjee, Eduardo Pasiliao Jr., Tathagata Mukherjee "FlightSense: A Spoofer Detection and Aircraft Identification System using Raw ADS-B Data" In Proceedings of IEEE BigData 2020 Prawar Poudel, Biswajit Ray, and Aleksandar Milenkovic, "Flashmark: Watermarking of NOR Flash Memories for Counterfeit Detection," in the Proceedings of the 58th Design Automation Conference (DAC 2020), San Francisco, CA, July 19-23, 2020, 6 pages. M. Shojaeshafiei, L. Etzkorn, and M. Anderson, “Multiple Layers of Fuzzy Logic to Quantify Vulnerabilities in IoT,” Proceedings of the 6th International Conference on Networks and Communications (NCO 2020), July 11-12, 2020, Toronto, Canada. M. Shojaeshafiei, L. Etzkorn, and M. Anderson, “Network System’s Vulnerability Quantification Using Multi-layered Fuzzy Logic Based on GQM,” Proceedings of the 2020 National Cyber Summit, June 2-4, 2020, Huntsville, AL. J.D. Winningham, D. J. Coe, J. H. Kulick, A. Milenkovic and L. Etzkorn, " A Single-Board Computing Constellation Supporting Integration of Hands-On Cybersecurity Laboratories into Operating Systems Courses," 2020 National Cyber Summit, June 2-4 2020. [NSA Grant H98230-17-1-0344] M. T. Shrove, E. Jovanov, “Forecasting Software Vulnerability Totals using Long Short-Term Memory (LSTM) Neural Networks,” Infotech, Vrnjacka Banja, Serbia, June 2020. Werth, A. and Morris, A., “Prototyping PLCs and IoT Devices in an HVAC Virtual Testbed to Study Impacts of Cyberattacks”, International Congress on Information and Communication Technology (ICICT), 2020 2019 C. D. Colvett, M. D. Petty, J. A. Bland, and K. R. Baker, “Simulating Cyberattacks with a Petri Net Discrete Event Simulator”, Proceedings of the 2019 International Conference on Computational Science and Computational Intelligence, December 5-7 2019, Las Vegas NV, pp. 67-71, doi:10.1109/CSCI49370.2019.00018. S. Sarkar, J. Liu, E. Jovanov, “A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-time,” IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, December 2019, pp. 1-6, doi: 10.1109/GLOBECOM38437.2019.9014318. M. D. Petty, P. M. Showers, T. S. Whitaker, J. A. Bland, W. A. Cantrell, C. D. Colvett, K. P. Maxwell, “Modeling Cyberattacks with Extended Petri Nets: Research Program Update”, Proceedings of the 2019 AlaSim Conference and Exhibition, October 24 2019, Huntsville AL. W. A. Cantrell, P. M. Showers, and M. D. Petty, “Verification of XML Encoded Petri Nets Modeling Cyberattacks”, Proceedings of the 2019 AlaSim Conference and Exhibition, October 24 2019, Huntsville AL. M. D. Petty, T. S. Whitaker, J. A. Bland, W. A. Cantrell, and K. P. Mayfield, “Modeling Cyberattacks with Extended Petri Nets: Research Program Overview and Status Report”, Proceedings of the 2019 International Conference on Modeling, Simulation, and Visualization Methods, Las Vegas NV, July 29–August 1 2019, pp. 27-33. K. P. Mayfield, M. D. Petty, T. S. Whitaker, W. A. Cantrell, S. M. Hice, J. McClendon, and P. J. Reyes, “Component Selection Process in Assembling Cyberattack Simulation Models”, Proceedings of the 2019 International Conference on Security and Management, Las Vegas NV, July 29–August 1 2019, pp. 168-174. Werth, A., and Morris, T., “A Specification-Based Intrusion Detection System for Malicious Payloads” , Proceedings of the 2019 National Cyber Summit Research Track, Huntsville, AL, June 4-6, 2019 SueAnne Griffith and Thomas H. Morris, "Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems," National Cyber Summit, pp 116-125, June 2019. Gupta, J., Kalaimannan, E., & Yoo, S.-M. (2019). A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single Investigator. In National Cyber Summit (pp. 202–219). Huntsville, Alabama, USA. M. Shojaeshafiei, L. Etzkorn, and M. Anderson, “Cybersecurity Framework Requirements to Quantify Vulnerabilities Based on GQM,” , Proceedings of the 2019 National Cyber Summit, June 4-6, 2019, , Huntsville, AL. Gaede, R. K., & Morris, T., & Das, R., & Lei, Y., & Alves, T., & Zhou, H., & Fahimi, F. (2019, June), Work in Progress: Layering Cybersecurity on Domain Engineering Instruction Paper presented at 2019 ASEE Annual Conference & Exposition , Tampa, Florida. J. A. Bland, C. D. Colvett, W. A. Cantrell, K. P. Mayfield, M. D. Petty, and T. S. Whitaker, “Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs”, Proceedings of the 2019 National Cyber Summit, Huntsville AL, June 4-6 2019, pp. 1-16, doi:10.1007/978-3-030-31239-8_18. Alexander A., Graham P., Jackson E., Johnson B., Williams T., Park J. (2020) “An Analysis of Cybersecurity Legislation and Policy Creation on the State Level.” In: Choo KK., Morris T., Peterson G. (eds) National Cyber Summit (NCS) Research Track. NCS 2019. Advances in Intelligent Systems and Computing, vol 1055. Springer, Cham. Available at: https://doi.org/10.1007/978-3-030-31239-8_3 K. P. Mayfield, M. D. Petty, T. S. Whitaker, J. A. Bland, and W. A. Cantrell, “Component-based Implementation of Cyberattack Simulation Models”, Proceedings of the 2019 ACM Southeast Conference, Kennesaw GA, April 18-20 2019, pp. 64-71, doi:10.1145/3299815.3314435.