Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by: Michael Powell (Fed)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 1 - 4 of 4

REDUCING THE CYBERSECURITY RISKS OF PORTABLE STORAGE MEDIA IN OT ENVIRONMENTS

September 30, 2025
Author(s)
Michael Powell, Fenimore Philip, Stephanie Saravia
Though portable storage media are convenient, their unregulated use poses cybersecurity risks for organizations utilizing them in their OT environments. Procedural, physical, and technical controls are important because they can minimize the likelihood of

Security Segmentation in a Small Manufacturing Environment

April 6, 2023
Author(s)
Michael Powell, John Hoyt, Aslam Sherule, Lynette Wilcox
Manufacturers are increasingly targeted in cyber-attacks. Small manufacturers are particularly vulnerable due to limitations in staff and resources to operate facilities and manage cybersecurity. Security segmentation is a cost-effective and efficient

Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector

March 16, 2022
Author(s)
Michael Powell, Michael Pease, Keith A. Stouffer, CheeYee Tang, Timothy Zimmerman, Chelsea Dean, Kangmin Zheng, John Hoyt, Mary Raguso, Joseph Brule, Aslam Sherule, Matthew Zopf
Today's manufacturing organizations rely on industrial control systems (ICS) to conduct their operations. Increasingly, ICS are facing more frequent, sophisticated cyber attacks—making manufacturing the second-most-targeted industry. Cyber attacks against

Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection

July 16, 2020
Author(s)
Michael P. Powell, James J. McCarthy, CheeYee Tang, Keith Stouffer, Timothy Zimmerman, William C. Barker, Titilayo Ogunyale, Devin M. Wynne
Industrial control systems (ICS) are used in many industries to monitor and control physical processes. As ICS continue to adopt commercially available information technology (IT) to promote corporate business systems' connectivity and remote access
Was this page helpful?