SIGN-IN REGISTER menu person_pinSign-in addRegister Home Products Home All products Cybersecurity and Malware Analysis Search by keyword search Apply view_module view_stream @DisCo: Binary-Level Vulnerability Detection Find out more AHA: Infrastructure Decision Support for Disaster Management Find out more ATIS: Malware Analysis and STIX Data Transformation Find out more ATTAR: Remote Testing Framework for Security Analysis and Protection Find out more Cerberus Find out more CIEMAT: Cyber-Informed Engineering Microgrid Analysis Tool Find out more Cirrus: Cloud Feasibility Assessment Tool for Grid Professionals Find out more CSET: Cyber Security Evaluation Tool Find out more CyOTE: Detecting Cyber Attacks in Operational Technology Environments Find out more CyStAR: Cyber-Physical Threat Detection and Asset Monitoring Find out more DaRT: Malicious Code Disassembly for Risk-Free Transport Find out more DISCOverflow: Project Code Structure Visualization Tool Find out more EFAC: Infrastructure Analysis for Enhanced Disaster Resilience Find out more EMV: Exploit, Malware, and Vulnerability Scoring GUI Find out more ESE: Comprehensive STIX1-to-STIX2 Conversion Tool Find out more HPCACT-2022: Video Annotation for Anomaly Detection in Data Centers Find out more ICSNPP: Industrial Control System Network Protocol Parsers Find out more Infrastructure eXpression: Discovery Tools Find out more Malcolm: Network Traffic Analysis Find out more MaSDE: Real-Time Dynamic Estimation for a Resilient Power Grid Find out more MASFIC: Streamlined Contingency Analysis for Power Utilities Find out more MaSTI: Network Monitoring for Enhanced Control System Protection Find out more NAVV Tool: Network Architecture Verification & Validation Tool Find out more OpDefender: Real-Time Network Traffic Analysis Find out more PacketSight: Mitigating Unusual Network Packets Find out more PANDA: Predictive Automation of Novel Defect Anomalies Find out more Parsnip Parser Creation Application: Find out more Polyglot Framework: Cross-Platform Tool Development Find out more PowDDeR v2: Power Distribution Designing for Resilience Application Find out more PowDDeR: Power Distribution Designing for Resilience Application Find out more Scramble Find out more SPEMMCRA: Control Strategy Testing for Microgrid Implementations Find out more STAR: Structured Threat Automated Response Find out more STIG: Graph-Based Threat Intelligence and Response System Find out more STIXEnforcer: Advanced STIX 2.1 Data Enrichment and Error Correction Tool Find out more STOAT: Automated Scoring Tool for Software Weaknesses Find out more STOTS: Network Threat Analysis and Visualization Suite Find out more TOPGEAR: Technology, Organization, and Person of interest Graph Extraction, Analysis, and Reporting Find out more Vendor 0: FPE Library for Structured File Encryption Find out more WiiBin: Machine Learning Binary Analysis for Reverse Engineering Find out more Category VIEW ALL chevron_right Deep Lynx (12) chevron_right Framework for Optimization of ResourCes and Economics (5) chevron_right Market & Supply Chain Models (8) chevron_right Structured Threat (9) chevron_right Binary Analysis (4) chevron_right Hydropower (8) chevron_right Nuclear Computational Resource Center (32) chevron_right Specific Use Case (19) chevron_right Software Development and IT (5) chevron_right Modeling and Simulation (0) chevron_right Nuclear Power Plant Safety (17) chevron_right Imaging (5) chevron_right Grid (12) chevron_right Environmental and Agricultural Technologies (15) chevron_right Energy and Power Systems (24) chevron_right Economic Modeling (16) chevron_right Digital Twin (14) chevron_right Dataset (7) chevron_right Data Analytics and Machine Learning (24) chevron_right Cybersecurity and Malware Analysis (40) chevron_right Biomass (3)