Category VIEW ALL
@DisCo: Binary-Level Vulnerability Detection
Technology No. CW-20-08-@DisCo
AHA: Infrastructure Decision Support for Disaster Management
Technology No. CW-19-09-AHA
ATIS: Malware Analysis and STIX Data Transformation
Technology No. CW-22-43-ATIS
ATTAR: Remote Testing Framework for Security Analysis and Protection
Technology No. CW-22-32-ATTAR
CATCH: Comprehensive Telemetry Analysis and Threat Intelligence Framework for Advanced Security
Technology No. CW-24-45-CATCH
Cerberus
Technology No. CW-22-16-Cerberus
CIEBAT: Cyber-Informed Engineering Battery Analysis Tool
Technology No. CW-24-52 CIEBAT
CIEMAT: Cyber-Informed Engineering Microgrid Analysis Tool
Technology No. CW-24-43-CIEMAT
Cirrus: Cloud Feasibility Assessment Tool for Grid Professionals
Technology No. CW-24-21-Cirrus
CRATER: A Repository of Cybersecurity Tools for Critical Infrastructure Resilience
Technology No. CW-24-49 CRATER
CSET: Cyber Security Evaluation Tool
Technology No. CW-19-01-CSET
CyOTE: Detecting Cyber Attacks in Operational Technology Environments
Technology No. CW-21-24-CyOTE
CyStAR: Cyber-Physical Threat Detection and Asset Monitoring
Technology No. CW-21-37-CyStAR
DaRT: Malicious Code Disassembly for Risk-Free Transport
Technology No. CW-22-51-DaRT
DISCOverflow: Project Code Structure Visualization Tool
Technology No. CW-20-06-DISCOverflow
EFAC: Infrastructure Analysis for Enhanced Disaster Resilience
Technology No. CW-22-17-EFAC
EMV: Exploit, Malware, and Vulnerability Scoring GUI
Technology No. CW-19-17-EMV
ESE: Comprehensive STIX1-to-STIX2 Conversion Tool
Technology No. CW-23-03-ESE
Fully Homomorphic Encryption System for Secure Digital Control and Signal Processing Applications
Technology No. CW-25-15 FHE
HPCACT-2022: Video Annotation for Anomaly Detection in Data Centers
Technology No. CW-23-01-HPCACT-2022
ICSNPP: Industrial Control System Network Protocol Parsers
Technology No. CW-20-31-ICSNPP
Infrastructure eXpression: Discovery Tools
Technology No. CW-21-52-IX-Discovery-Tools
M220 Software Package: Full-Stack Software for Cognitive Radio Communications
Technology No. CW-25-05 M220
Malcolm: Network Traffic Analysis
Technology No. CW-18-18-Malcolm
MaSDE: Real-Time Dynamic Estimation for a Resilient Power Grid
Technology No. CW-22-18-MaSDE
MASFIC: Streamlined Contingency Analysis for Power Utilities
Technology No. CW-22-52-MASFIC
MaSTI: Network Monitoring for Enhanced Control System Protection
Technology No. CW-22-21-MaSTI
NAVV Tool: Network Architecture Verification & Validation Tool
Technology No. CW-21-40-NAVV-Tool
NSTS: Automated NVD Vulnerability Search to STIX Bundle Translator
Technology No. CW-24-46 NSTS
OpDefender: Real-Time Network Traffic Analysis
Technology No. CW-21-33-OpDefender
PacketSight: Mitigating Unusual Network Packets
Technology No. CW-23-34-castor
PANDA: Predictive Automation of Novel Defect Anomalies
Technology No. CW-24-32-PANDA
Parsnip Parser Creation Application:
Technology No. CW-23-54-Parsnip
Polyglot Framework: Cross-Platform Tool Development
Technology No. CW-23-53-Polyglot
PowDDeR v2: Power Distribution Designing for Resilience Application
Technology No. CW-21-46-PowDDeR-v2
PowDDeR: Power Distribution Designing for Resilience Application
Technology No. CW-18-11-PowDDeR-v2
Scramble
Technology No. CW-22-14-Scramble
Sentinel: Low-Power Semi-Supervised Machine-Learning-Based Intrusion Detection for IoT Networks
Technology No. CW-24-51-sentinel
SPEMMCRA: Control Strategy Testing for Microgrid Implementations
Technology No. CW-20-24-SPEMMCRA
STAR: Structured Threat Automated Response
Technology No. CW-20-10-STAR
STIG: Graph-Based Threat Intelligence and Response System
Technology No. CW-18-04-A-STIG
STIXEnforcer: Advanced STIX 2.1 Data Enrichment and Error Correction Tool
Technology No. CW-22-44-STIXEnforcer
STOAT: Automated Scoring Tool for Software Weaknesses
Technology No. CW-22-03-STOAT
STOTS: Network Threat Analysis and Visualization Suite
Technology No. CW-19-10-STOTS
TOPGEAR: Technology, Organization, and Person of interest Graph Extraction, Analysis, and Reporting
Technology No. CW-23-20-TOPGEAR
Vendor 0: FPE Library for Structured File Encryption
Technology No. CW-19-16-Vendor-0
WiiBin: Machine Learning Binary Analysis for Reverse Engineering
Technology No. CW-20-05-WiiBin