Jonathan Margulies

Learn More
The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks. This paper discusses attribution techniques along with the associated legal and technical challenges. It presents a proposal for a voluntary network of(More)
As part of this special issue on control systems for the energy sector, guest editors Sean Peisert and Jonathan Margulies put together a roundtable discussion so readers can learn about the security challenges facing the industrial control system/SCADA world from those who are on the front lines. The discussion touches on some of the hard problems of(More)
T here are at least two types of security vulnerabili-ties: flawed or insufficient software behavior specifications that allow compromise—for example, authentication that is lacking or that can be spoofed—and incorrect implementation of specifications— buffer overflows being a classic example and Heartbleed being a notable recent one. The sad truth is that(More)
Introduction & Correlation analysis of low-frequency fluctuations is well established in fMRI as a method for determining functional connectivity, which in data collected independent of task, have been termed: resting-state networks [1] & Similar methods have been applied to optical imaging data [2]. & Here we report the correlation analysis of(More)
E arly last year, my garage door opener's motor died. While researching potential replacement units, I focused on Chamberlain's products because they had a reputation for high quality. Once I settled on a model, I noticed another option: for a little more money, Chamberlain would include the MyQ Internet Gateway, its new system for monitoring and(More)
  • 1