We have deep experience analyzing networks and data sources for cyber threats and developing robust defenses and protocols. Our systems can be used for civil and military cybermissions as well as in commercial applications.
Deshmukh, J.V., Sankaranarayanan, S., “Formal Techniques for Verification and Testing of Cyber-Physical Systems,”
Cheng, M., Yin, C., Zhang, J., Nazarian, S., Deshmukh, J., Bogdan, P., “A General Trust Framework for Multi-Agent Systems,” University of Southern California.
Wu, M., Wang, J., Deshmukh, J., Wang, C., “Shield Synthesis for Real: Enforcing Safety in Cyber-Physical Systems,”
Abbas, H., Hoxha, B., Fainekos, G., Deshmukh, J.V., Kapinski, J., Ueda, K., “Conformance Testing as Falsification for Cyber-Physical Systems.”