RCB Hink, JM Beaver, MA Buckner, T Morris, U Adhikari, S Pan. (2016). Machine learning for power system disturbance and cyber-attack discrimination. 7th international symposium on resilient control systems (ISRCS), 1-8
JM Beaver, RC Borges-Hink, MA Buckner. (2013). An evaluation of machine learning methods to detect malicious SCADA communications. 12th International Conference on Machine Learning and Applications 2, 54-59
R Borges, T Menzies. (2012). Learning to change projects. Proceedings of the 8th International Conference on Predictive Models in Software Engineering, pp. 11-18 ACM
RCB Hink, K Goseva-Popstojanov. (2016). Characterization of Cyberattacks Aimed at Integrated Industrial Control and Enterprise Systems: A Case Study. IEEE 17th International Symposium on High Assurance Systems Engineering (HASE) pp. 149-156
RB Hink, AA Suarez. (2010). Basic human computer interface for the blind. 8th Latin American and Caribbean conference for Engineering and Technology (LACCEI), Arequipa, Peru
R Borges, H Kettani, R Patton, Y Masalmah. (2011). Bitpredator: A discovery algorithm for bittorrent initial seeders and peers. International Conference on Advanced Computer Theory and Engineering, 4th (ICACTE). ASME
BSides Knoxville 2019 - Find out what happens when 70 universities and 1000 volunteers participate in a cyber security competition
Oak Ridge National Lab, in cooperation with six other National Labs, has now twice held a cyber security competition across the nation, involving 70 university teams, and 1000 volunteers. The most recent event was in December 2018. The competition expanded from one held at Argonne National Lab involving schools and resources local to the Chicago area. The Department of Energy now sponsors the competition and changed its name to CyberForce (tm) (cyberforcecompetition.com) in order to emphasize its goal of workforce development. A unique feature of this competition is each team receives a physical Industrial Control System that is part of what they have to defend. The remainder of their systems are in the cloud - the last two competitions have used Microsoft Azure. The Blue Teams are in the role of making sure their power plant remains operational in spite of attack by Red Team professionals. The hybrid of cloud and physical resources is part of the challenge the students face when competing in this competition. Another unique feature of the competition is the role of Green Teams who are non-specialists who come in on competition day, read the documentation, and operate the power plant. They do not have direct connection to the Blue Teams, except through whatever help desk system is specified and maintained by the Blue Teams. The teams have a month beforehand with their competition environment in order to prepare for the day of competition
Link available soon...
BSides Knoxville 2015 - Cyber Cyber Cyber: Student Security Competitions
In this talk we will dive into the recent development of security competitions for the middle school, high school and collegiate levels like CyberPatriot, the Collegiate Cyber Defense Competition (CCDC), the US Cyber Challenge (USCC) and picoCTF. We will give an overview of the competitions, their challenges and what is available for students, instructors and professionals in the Knoxville area. This talk will also offer some tips and tactics to be successful at these events. By leveraging past challenges and learning the rules and format we will show you how to “hack” the competition. We will also go over our personal experiences participating and leading teams in these events.