S. Williams, S. Remy, A. Howard, “3-D Simulations for Testing and Validating Robotic-Driven Applications for Exploring Lunar Pole,” AIAA Infotech@Aerospace 2010, Atlanta, GA, April 2010.
Experimental Security Analysis of a Modern Automobile. Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage. Oakland 2010. PDF.
Senor Network Apps
Lazy Preemption to Enable Path-Based Analysis of Interrupt-Driven Code. Wei Le, Jing Yang, Mary Lou Soffa and Kamin Whitehouse, International Workshop on Software Engineering for Sensor Network Applications, 2011. [pdf] [ppt]
Trustworthy medical device software. Kevin Fu. In Public Health Effectiveness of the FDA 510(k) Clearance Process: Measuring Postmarket Performance and Other Select Topics: Workshop Report, 2011. [PDF][slides][video][workshop][link]
Software issues for the medical device approval process, Kevin Fu. April 2011. Statement to the Special Committee on Aging, United States Senate, Hearing on a delicate balance: FDA and the reform of the medical device approval process. [PDF][link]
Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. Tamara Denning, Alan Borning, Batya Friedman, Brian T. Gill, Tadayoshi Kohno, and William H. Maisel. CHI 2010 PDF of paper
Improving the security and privacy of implantable medical devices. William H. Maisel and Tadayoshi Kohno.New England Journal of Medicine, April 2010 NEJM link
Neurosecurity: Security and Privacy for Neural Devices.Tamara Denning, Yoki Matsuoka, and Tadayoshi Kohno.Neurosurgical Focus, July 2009 Additional information: Abstract; PDF of paper