Most Popular Papers *
China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking
Chris C. Demchak and Yuval Shavitt
Characterizing Cyberattacks against Operational Technology Infrastructures through the Lens of Attack Flows
Sherman Kettner, Caleb Chang, Ekzhin Ear, and Shouhuai Xu
Director, Military Cyber Institute
Joseph Schafer
Anomaly Detection of Network Layer Attacks Against Cyber Physical Systems Using Machine Learning and Deep Learning Techniques
James Alger and Michael Tu
Quantifying Adversary Military Forces’ Susceptibility to Cognitive Attacks
Bonnie Rushing, Cole Nelson, Shouhuai Xu, Christofer “Raven” O’Keefe, and Olga Karpoyan
Characterizing Caldera’s Cyber Attack Emulation Capabilities
Caleb Chang, Matthew Cao, Kenyou Teoh, Ekzhin Ear, and Shouhuai Xu
Network and Multipath Traceroute Visualization
Cameron Makowski
Understanding Russia’s Cyber Policies, Strategies, and Doctrines
Bryan Hancock, Hanh Nguyen, Olga Karpoyan, Ekzhin Ear, and Shouhuai Xu
* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 06/25/25.