BibTeX records: Sean Peisert

download as .bib file

@inproceedings{DBLP:conf/icassp/LiuSP24,
  author       = {Hang Liu and
                  Anna Scaglione and
                  Sean Peisert},
  title        = {Privacy Leakage In Graph Signal To Graph Matching Problems},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024},
  pages        = {9371--9375},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICASSP48485.2024.10447364},
  doi          = {10.1109/ICASSP48485.2024.10447364},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/LiuSP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-02324,
  author       = {Nikhil Ravi and
                  Anna Scaglione and
                  Sean Peisert and
                  Parth Pradhan},
  title        = {Differentially Private Communication of Measurement Anomalies in the
                  Smart Grid},
  journal      = {CoRR},
  volume       = {abs/2403.02324},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.02324},
  doi          = {10.48550/ARXIV.2403.02324},
  eprinttype    = {arXiv},
  eprint       = {2403.02324},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-02324.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Peisert23,
  author       = {Sean Peisert},
  title        = {The First 20 Years of {IEEE} Security {\&} Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {4--6},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3236420},
  doi          = {10.1109/MSEC.2023.3236420},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Peisert23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Peisert23a,
  author       = {Sean Peisert},
  title        = {On Software Infrastructure: Develop, Prove, Profit?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {4--8},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3273492},
  doi          = {10.1109/MSEC.2023.3273492},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Peisert23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RamakrishnaSWRP23,
  author       = {Raksha Ramakrishna and
                  Anna Scaglione and
                  Tong Wu and
                  Nikhil Ravi and
                  Sean Peisert},
  title        = {Differential Privacy for Class-Based Data: {A} Practical Gaussian
                  Mechanism},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {5096--5108},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3289128},
  doi          = {10.1109/TIFS.2023.3289128},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RamakrishnaSWRP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/WuSSAP23,
  author       = {Tong Wu and
                  Anna Scaglione and
                  Adrian Petru Surani and
                  Daniel B. Arnold and
                  Sean Peisert},
  title        = {Network-Constrained Reinforcement Learning for Optimal {EV} Charging
                  Control},
  booktitle    = {{IEEE} International Conference on Communications, Control, and Computing
                  Technologies for Smart Grids, SmartGridComm IEEE, Glasgow, United
                  Kingdom, October 31 - November 3, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SmartGridComm57358.2023.10333926},
  doi          = {10.1109/SMARTGRIDCOMM57358.2023.10333926},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/WuSSAP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartnets/KadamSRPLS23,
  author       = {Sachin Kadam and
                  Anna Scaglione and
                  Nikhil Ravi and
                  Sean Peisert and
                  Brent Lunghino and
                  Aram Shumavon},
  title        = {Optimum Noise Mechanism for Probabilistic Differentially Private Queries
                  in Discrete Finite Sets},
  booktitle    = {International Conference on Smart Applications, Communications and
                  Networking, SmartNets 2023, Istanbul, Turkey, July 25-27, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SmartNets58706.2023.10215578},
  doi          = {10.1109/SMARTNETS58706.2023.10215578},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartnets/KadamSRPLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-03749,
  author       = {Nikhil Ravi and
                  Anna Scaglione and
                  Julieta Giraldez and
                  Parth Pradhan and
                  Chuck Moran and
                  Sean Peisert},
  title        = {Solar Photovoltaic Systems Metadata Inference and Differentially Private
                  Publication},
  journal      = {CoRR},
  volume       = {abs/2304.03749},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.03749},
  doi          = {10.48550/ARXIV.2304.03749},
  eprinttype    = {arXiv},
  eprint       = {2304.03749},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-03749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-05578,
  author       = {Raksha Ramakrishna and
                  Anna Scaglione and
                  Tong Wu and
                  Nikhil Ravi and
                  Sean Peisert},
  title        = {Differential Privacy for Class-based Data: {A} Practical Gaussian
                  Mechanism},
  journal      = {CoRR},
  volume       = {abs/2306.05578},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.05578},
  doi          = {10.48550/ARXIV.2306.05578},
  eprinttype    = {arXiv},
  eprint       = {2306.05578},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-05578.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Peisert22,
  author       = {Sean Peisert},
  title        = {Unsafe at Any Clock Speed: The Insecurity of Computer System Design,
                  Implementation, and Operation},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {1},
  pages        = {4--9},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2021.3127086},
  doi          = {10.1109/MSEC.2021.3127086},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Peisert22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/RaviSKGPLLS22,
  author       = {Nikhil Ravi and
                  Anna Scaglione and
                  Sachin Kadam and
                  Reinhard Gentz and
                  Sean Peisert and
                  Brent Lunghino and
                  Emmanuel Levijarvi and
                  Aram Shumavon},
  title        = {Differentially Private -Means Clustering Applied to Meter Data Analysis
                  and Synthesis},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {13},
  number       = {6},
  pages        = {4801--4814},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSG.2022.3184252},
  doi          = {10.1109/TSG.2022.3184252},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/RaviSKGPLLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HaydariCZMP22,
  author       = {Ammar Haydari and
                  Chen{-}Nee Chuah and
                  H. Michael Zhang and
                  Jane MacFarlane and
                  Sean Peisert},
  title        = {Differentially Private Map Matching for Mobility Trajectories},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {293--303},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567974},
  doi          = {10.1145/3564625.3567974},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HaydariCZMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/ArnoldNRCSP22,
  author       = {Daniel Arnold and
                  Sy{-}Toan Ngo and
                  Ciaran M. Roberts and
                  Yize Chen and
                  Anna Scaglione and
                  Sean Peisert},
  title        = {Adam-based Augmented Random Search for Control Policies for Distributed
                  Energy Resource Cyber Attack Mitigation},
  booktitle    = {American Control Conference, {ACC} 2022, Atlanta, GA, USA, June 8-10,
                  2022},
  pages        = {4559--4566},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/ACC53348.2022.9867545},
  doi          = {10.23919/ACC53348.2022.9867545},
  timestamp    = {Mon, 06 Nov 2023 12:57:51 +0100},
  biburl       = {https://dblp.org/rec/conf/amcc/ArnoldNRCSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seed/AkramAPL22,
  author       = {Ayaz Akram and
                  Venkatesh Akella and
                  Sean Peisert and
                  Jason Lowe{-}Power},
  title        = {SoK: Limitations of Confidential Computing via TEEs for High-Performance
                  Compute Systems},
  booktitle    = {2022 {IEEE} International Symposium on Secure and Private Execution
                  Environment Design (SEED), Storrs, CT, USA, September 26-27, 2022},
  pages        = {121--132},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SEED55351.2022.00018},
  doi          = {10.1109/SEED55351.2022.00018},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/seed/AkramAPL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-11825,
  author       = {Daniel B. Arnold and
                  Sy{-}Toan Ngo and
                  Ciaran M. Roberts and
                  Yize Chen and
                  Anna Scaglione and
                  Sean Peisert},
  title        = {Adam-based Augmented Random Search for Control Policies for Distributed
                  Energy Resource Cyber Attack Mitigation},
  journal      = {CoRR},
  volume       = {abs/2201.11825},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.11825},
  eprinttype    = {arXiv},
  eprint       = {2201.11825},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-11825.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-05373,
  author       = {Daniel B. Arnold and
                  Shammya Saha and
                  Sy{-}Toan Ngo and
                  Ciaran M. Roberts and
                  Anna Scaglione and
                  Nathan G. Johnson and
                  Sean Peisert and
                  David Pinney},
  title        = {Adaptive Control of Distributed Energy Resources for Distribution
                  Grid Voltage Stability},
  journal      = {CoRR},
  volume       = {abs/2202.05373},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.05373},
  eprinttype    = {arXiv},
  eprint       = {2202.05373},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-05373.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Peisert21,
  author       = {Sean Peisert},
  title        = {Trustworthy scientific computing},
  journal      = {Commun. {ACM}},
  volume       = {64},
  number       = {5},
  pages        = {18--21},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457191},
  doi          = {10.1145/3457191},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/Peisert21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Peisert21,
  author       = {Sean Peisert},
  title        = {Reflections on the Past, Perspectives on the Future [From the Editors]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {4--7},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3034670},
  doi          = {10.1109/MSEC.2020.3034670},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Peisert21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PeisertSOMBLMMP21,
  author       = {Sean Peisert and
                  Bruce Schneier and
                  Hamed Okhravi and
                  Fabio Massacci and
                  Terry Benzel and
                  Carl E. Landwehr and
                  Mohammad Mannan and
                  Jelena Mirkovic and
                  Atul Prakash and
                  James Bret Michael},
  title        = {Perspectives on the SolarWinds Incident},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {7--13},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3051235},
  doi          = {10.1109/MSEC.2021.3051235},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PeisertSOMBLMMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MassacciJP21,
  author       = {Fabio Massacci and
                  Trent Jaeger and
                  Sean Peisert},
  title        = {SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing
                  With the Devil?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {14--19},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3050433},
  doi          = {10.1109/MSEC.2021.3050433},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MassacciJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/RobertsNMSPA21,
  author       = {Ciaran M. Roberts and
                  Sy{-}Toan Ngo and
                  Alexandre Milesi and
                  Anna Scaglione and
                  Sean Peisert and
                  Daniel B. Arnold},
  title        = {Deep Reinforcement Learning for Mitigating Cyber-Physical {DER} Voltage
                  Unbalance Attacks},
  booktitle    = {2021 American Control Conference, {ACC} 2021, New Orleans, LA, USA,
                  May 25-28, 2021},
  pages        = {2861--2867},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/ACC50511.2021.9482815},
  doi          = {10.23919/ACC50511.2021.9482815},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/RobertsNMSPA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ClavinHWPDWP21,
  author       = {James R. Clavin and
                  Yue Huang and
                  Xin Wang and
                  Pradeep M. Prakash and
                  Sisi Duan and
                  Jianwu Wang and
                  Sean Peisert},
  title        = {A Framework for Evaluating {BFT}},
  booktitle    = {27th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2021, Beijing, China, December 14-16, 2021},
  pages        = {193--200},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICPADS53394.2021.00030},
  doi          = {10.1109/ICPADS53394.2021.00030},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpads/ClavinHWPDWP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/AkramGALP21,
  author       = {Ayaz Akram and
                  Anna Giannakou and
                  Venkatesh Akella and
                  Jason Lowe{-}Power and
                  Sean Peisert},
  title        = {Performance Analysis of Scientific Computing Workloads on General
                  Purpose TEEs},
  booktitle    = {35th {IEEE} International Parallel and Distributed Processing Symposium,
                  {IPDPS} 2021, Portland, OR, USA, May 17-21, 2021},
  pages        = {1066--1076},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IPDPS49936.2021.00115},
  doi          = {10.1109/IPDPS49936.2021.00115},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/AkramGALP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-04983,
  author       = {Yize Chen and
                  Daniel B. Arnold and
                  Yuanyuan Shi and
                  Sean Peisert},
  title        = {Understanding the Safety Requirements for Learning-based Power Systems
                  Operations},
  journal      = {CoRR},
  volume       = {abs/2110.04983},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.04983},
  eprinttype    = {arXiv},
  eprint       = {2110.04983},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-04983.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-07850,
  author       = {Nikhil Ravi and
                  Anna Scaglione and
                  Sean Peisert},
  title        = {Colored Noise Mechanism for Differentially Private Clustering},
  journal      = {CoRR},
  volume       = {abs/2111.07850},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.07850},
  eprinttype    = {arXiv},
  eprint       = {2111.07850},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-07850.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-11661,
  author       = {Sachin Kadam and
                  Anna Scaglione and
                  Nikhil Ravi and
                  Sean Peisert and
                  Brent Lunghino and
                  Aram Shumavon},
  title        = {Optimum Noise Mechanism for Differentially Private Queries in Discrete
                  Finite Sets},
  journal      = {CoRR},
  volume       = {abs/2111.11661},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.11661},
  eprinttype    = {arXiv},
  eprint       = {2111.11661},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-11661.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-13786,
  author       = {Luca Pion{-}Tonachini and
                  Kristofer E. Bouchard and
                  H{\'{e}}ctor Garc{\'{\i}}a Mart{\'{\i}}n and
                  Sean Peisert and
                  W. Bradley Holtz and
                  Anil Aswani and
                  Dipankar Dwivedi and
                  Haruko M. Wainwright and
                  Ghanshyam Pilania and
                  Benjamin Nachman and
                  Babetta L. Marrone and
                  Nicola Falco and
                  Prabhat and
                  Daniel B. Arnold and
                  Alejandro Wolf{-}Yadlin and
                  Sarah Powers and
                  Sharlee Climer and
                  Quinn Jackson and
                  Ty Carlson and
                  Michael Sohn and
                  Petrus H. Zwart and
                  Neeraj Kumar and
                  Amy Justice and
                  Claire J. Tomlin and
                  Daniel A. Jacobson and
                  Gos Micklem and
                  Georgios V. Gkoutos and
                  Peter J. Bickel and
                  Jean{-}Baptiste Cazier and
                  Juliane M{\"{u}}ller and
                  Bobbie{-}Jo Webb{-}Robertson and
                  Rick Stevens and
                  Mark Anderson and
                  Kenneth Kreutz{-}Delgado and
                  Michael W. Mahoney and
                  James B. Brown},
  title        = {Learning from learning machines: a new generation of {AI} technology
                  to meet the needs of science},
  journal      = {CoRR},
  volume       = {abs/2111.13786},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.13786},
  eprinttype    = {arXiv},
  eprint       = {2111.13786},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-13786.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-15152,
  author       = {Yize Chen and
                  Yuanyuan Shi and
                  Daniel B. Arnold and
                  Sean Peisert},
  title        = {{SAVER:} Safe Learning-Based Controller for Real-Time Voltage Regulation},
  journal      = {CoRR},
  volume       = {abs/2111.15152},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.15152},
  eprinttype    = {arXiv},
  eprint       = {2111.15152},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-15152.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-08487,
  author       = {Ammar Haydari and
                  H. Michael Zhang and
                  Chen{-}Nee Chuah and
                  Jane MacFarlane and
                  Sean Peisert},
  title        = {Adaptive Differential Privacy Mechanism for Aggregated Mobility Dataset},
  journal      = {CoRR},
  volume       = {abs/2112.08487},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.08487},
  eprinttype    = {arXiv},
  eprint       = {2112.08487},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-08487.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/GiannakouDP20,
  author       = {Anna Giannakou and
                  Dipankar Dwivedi and
                  Sean Peisert},
  title        = {A machine learning approach for packet loss prediction in science
                  flows},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {102},
  pages        = {190--197},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.07.053},
  doi          = {10.1016/J.FUTURE.2019.07.053},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/GiannakouDP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Peisert20,
  author       = {Sean Peisert},
  title        = {Isolating Insecurely: {A} Call to Arms for the Security and Privacy
                  Community During the Time of {COVID-19}},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {4},
  pages        = {4--7},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2020.2992316},
  doi          = {10.1109/MSEC.2020.2992316},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Peisert20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/JameiRTGRSP20,
  author       = {Mahdi Jamei and
                  Raksha Ramakrishna and
                  Teklemariam Tesfay and
                  Reinhard Gentz and
                  Ciaran M. Roberts and
                  Anna Scaglione and
                  Sean Peisert},
  title        = {Phasor Measurement Units Optimal Placement and Performance Limits
                  for Fault Localization},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {38},
  number       = {1},
  pages        = {180--192},
  year         = {2020},
  url          = {https://doi.org/10.1109/JSAC.2019.2951971},
  doi          = {10.1109/JSAC.2019.2951971},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/JameiRTGRSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/RobertsSJGPSMMA20,
  author       = {Ciaran M. Roberts and
                  Anna Scaglione and
                  Mahdi Jamei and
                  Reinhard Gentz and
                  Sean Peisert and
                  Emma M. Stewart and
                  Chuck McParland and
                  Alex McEachern and
                  Daniel B. Arnold},
  title        = {Learning Behavior of Distribution System Discrete Control Devices
                  for Cyber-Physical Security},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {11},
  number       = {1},
  pages        = {749--761},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSG.2019.2936016},
  doi          = {10.1109/TSG.2019.2936016},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/RobertsSJGPSMMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/GeganMGBP20,
  author       = {Ross K. Gegan and
                  Christina Mao and
                  Dipak Ghosal and
                  Matt Bishop and
                  Sean Peisert},
  title        = {Anomaly Detection for Science DMZs Using System Performance Data},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2020, Big Island, HI, USA, February 17-20, 2020},
  pages        = {492--496},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICNC47757.2020.9049695},
  doi          = {10.1109/ICNC47757.2020.9049695},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccnc/GeganMGBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/CarrenoRSARNPP20,
  author       = {Ignacio Losada Carreno and
                  Raksha Ramakrishna and
                  Anna Scaglione and
                  Daniel B. Arnold and
                  Ciaran M. Roberts and
                  Sy{-}Toan Ngo and
                  Sean Peisert and
                  David Pinney},
  title        = {SoDa: An Irradiance-Based Synthetic Solar Data Generation Tool},
  booktitle    = {2020 {IEEE} International Conference on Communications, Control, and
                  Computing Technologies for Smart Grids, SmartGridComm 2020, Tempe,
                  AZ, USA, November 11-13, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SmartGridComm47815.2020.9302941},
  doi          = {10.1109/SMARTGRIDCOMM47815.2020.9302941},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/CarrenoRSARNPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/RobertsNMPASSJK20,
  author       = {Ciaran M. Roberts and
                  Sy{-}Toan Ngo and
                  Alexandre Milesi and
                  Sean Peisert and
                  Daniel B. Arnold and
                  Shammya Saha and
                  Anna Scaglione and
                  Nathan G. Johnson and
                  Anton Kocheturov and
                  Dmitriy Fradkin},
  title        = {Deep Reinforcement Learning for {DER} Cyber-Attack Mitigation},
  booktitle    = {2020 {IEEE} International Conference on Communications, Control, and
                  Computing Technologies for Smart Grids, SmartGridComm 2020, Tempe,
                  AZ, USA, November 11-13, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SmartGridComm47815.2020.9302997},
  doi          = {10.1109/SMARTGRIDCOMM47815.2020.9302997},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/RobertsNMPASSJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-03135,
  author       = {Bogdan Copos and
                  Sean Peisert},
  title        = {Catch Me If You Can: Using Power Analysis to Identify {HPC} Activity},
  journal      = {CoRR},
  volume       = {abs/2005.03135},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.03135},
  eprinttype    = {arXiv},
  eprint       = {2005.03135},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-03135.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-13088,
  author       = {Ciaran M. Roberts and
                  Sy{-}Toan Ngo and
                  Alexandre Milesi and
                  Sean Peisert and
                  Daniel B. Arnold and
                  Shammya Saha and
                  Anna Scaglione and
                  Nathan G. Johnson and
                  Anton Kocheturov and
                  Dmitriy Fradkin},
  title        = {Deep Reinforcement Learning for {DER} Cyber-Attack Mitigation},
  journal      = {CoRR},
  volume       = {abs/2009.13088},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.13088},
  eprinttype    = {arXiv},
  eprint       = {2009.13088},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-13088.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-13216,
  author       = {Ayaz Akram and
                  Anna Giannakou and
                  Venkatesh Akella and
                  Jason Lowe{-}Power and
                  Sean Peisert},
  title        = {Performance Analysis of Scientific Computing Workloads on Trusted
                  Execution Environments},
  journal      = {CoRR},
  volume       = {abs/2010.13216},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.13216},
  eprinttype    = {arXiv},
  eprint       = {2010.13216},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-13216.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-09620,
  author       = {Shammya Shananda Saha and
                  Daniel Arnold and
                  Anna Scaglione and
                  Eran Schweitzer and
                  Ciaran M. Roberts and
                  Sean Peisert and
                  Nathan G. Johnson},
  title        = {Lyapunov Stability of Smart Inverters Using Linearized DistFlow Approximation},
  journal      = {CoRR},
  volume       = {abs/2011.09620},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.09620},
  eprinttype    = {arXiv},
  eprint       = {2011.09620},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-09620.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Peisert19,
  author       = {Sean Peisert},
  title        = {Some Experiences in Developing Security Technology That Actually Get
                  Used},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {2},
  pages        = {4--7},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2899711},
  doi          = {10.1109/MSEC.2019.2899711},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Peisert19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/StockmanDGP19,
  author       = {Melissa Stockman and
                  Dipankar Dwivedi and
                  Reinhard Gentz and
                  Sean Peisert},
  title        = {Detecting control system misbehavior by fingerprinting programmable
                  logic controller functionality},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {26},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100306},
  doi          = {10.1016/J.IJCIP.2019.100306},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/StockmanDGP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eScience/GentzPBG19,
  author       = {Reinhard Gentz and
                  Sean Peisert and
                  Joshua Boverhof and
                  Daniel Gunter},
  title        = {{SPARCS:} Stream-Processing Architecture Applied in Real-Time Cyber-Physical
                  Security},
  booktitle    = {15th International Conference on eScience, eScience 2019, San Diego,
                  CA, USA, September 24-27, 2019},
  pages        = {199--202},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eScience.2019.00028},
  doi          = {10.1109/ESCIENCE.2019.00028},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eScience/GentzPBG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eScience/GentzMBP19,
  author       = {Reinhard Gentz and
                  H{\'{e}}ctor Garc{\'{\i}}a Mart{\'{\i}}n and
                  Edward Baidoo and
                  Sean Peisert},
  title        = {Workflow Automation in Liquid Chromatography Mass Spectrometry},
  booktitle    = {15th International Conference on eScience, eScience 2019, San Diego,
                  CA, USA, September 24-27, 2019},
  pages        = {638--639},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eScience.2019.00095},
  doi          = {10.1109/ESCIENCE.2019.00095},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eScience/GentzMBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucc/WonjigaPRM19,
  author       = {Amir Teshome Wonjiga and
                  Sean Peisert and
                  Louis Rilling and
                  Christine Morin},
  editor       = {Kenneth Johnson and
                  Josef Spillner and
                  Dalibor Klus{\'{a}}cek and
                  Ashiq Anjum},
  title        = {Blockchain as a Trusted Component in Cloud {SLA} Verification},
  booktitle    = {Proceedings of the 12th {IEEE/ACM} International Conference on Utility
                  and Cloud Computing, {UCC} 2019, Companion Volume, Auckland, New Zealand,
                  December 2-5, 2019},
  pages        = {93--100},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368235.3368872},
  doi          = {10.1145/3368235.3368872},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ucc/WonjigaPRM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/xsede/AdamsABBCDFHHJK19,
  author       = {Andrew K. Adams and
                  Kay Avila and
                  Jim Basney and
                  Dana Brunson and
                  Robert Cowles and
                  Jeannette Dopheide and
                  Terry Fleury and
                  Elisa Heymann and
                  Florence D. Hudson and
                  Craig Jackson and
                  Ryan Kiser and
                  Mark Krenz and
                  Jim Marsteller and
                  Barton P. Miller and
                  Sean Peisert and
                  Scott Russell and
                  Susan Sons and
                  Von Welch and
                  John Zage},
  editor       = {Thomas R. Furlani},
  title        = {Trusted {CI} Experiences in Cybersecurity and Service to Open Science},
  booktitle    = {Proceedings of the Practice and Experience in Advanced Research Computing
                  on Rise of the Machines (learning), {PEARC} 2019, Chicago, IL, USA,
                  July 28 - August 01, 2019},
  pages        = {60},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3332186.3340601},
  doi          = {10.1145/3332186.3340601},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/xsede/AdamsABBCDFHHJK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-05383,
  author       = {Andrew K. Adams and
                  Kay Avila and
                  Jim Basney and
                  Dana Brunson and
                  Robert Cowles and
                  Jeannette Dopheide and
                  Terry Fleury and
                  Elisa Heymann and
                  Florence D. Hudson and
                  Craig Jackson and
                  Ryan Kiser and
                  Mark Krenz and
                  Jim Marsteller and
                  Barton P. Miller and
                  Sean Peisert and
                  Scott Russell and
                  Susan Sons and
                  Von Welch and
                  John Zage},
  title        = {Trusted {CI} Experiences in Cybersecurity and Service to Open Science},
  journal      = {CoRR},
  volume       = {abs/1904.05383},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.05383},
  eprinttype    = {arXiv},
  eprint       = {1904.05383},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-05383.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BenzelP18,
  author       = {Terry Benzel and
                  Sean Peisert},
  title        = {Selected Papers from the 2017 {IEEE} Symposium on Security and Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {10--11},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331038},
  doi          = {10.1109/MSP.2018.1331038},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BenzelP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jamia/PeisertDBBCGBST18,
  author       = {Sean Peisert and
                  Eli Dart and
                  William Barnett and
                  Edward Balas and
                  James Cuff and
                  Robert L. Grossman and
                  Ari Berman and
                  Anurag Shankar and
                  Brian Tierney},
  title        = {The medical science {DMZ:} a network design pattern for data-intensive
                  medical science},
  journal      = {J. Am. Medical Informatics Assoc.},
  volume       = {25},
  number       = {3},
  pages        = {267--274},
  year         = {2018},
  url          = {https://doi.org/10.1093/jamia/ocx104},
  doi          = {10.1093/JAMIA/OCX104},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jamia/PeisertDBBCGBST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sc/GiannakouGP18,
  author       = {Anna Giannakou and
                  Daniel Gunter and
                  Sean Peisert},
  title        = {Flowzilla: {A} Methodology for Detecting Data Transfer Anomalies in
                  Research Networks},
  booktitle    = {Proceedings of the 5th {IEEE/ACM} International Workshop on Innovating
                  the Network for Data-Intensive Science, INDIS@SC 2018, Dallas, TX,
                  USA, November 11, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INDIS.2018.00004},
  doi          = {10.1109/INDIS.2018.00004},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sc/GiannakouGP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/JameiSP18,
  author       = {Mahdi Jamei and
                  Anna Scaglione and
                  Sean Peisert},
  title        = {Low-Resolution Fault Localization Using Phasor Measurement Units with
                  Community Detection},
  booktitle    = {2018 {IEEE} International Conference on Communications, Control, and
                  Computing Technologies for Smart Grids, SmartGridComm 2018, Aalborg,
                  Denmark, October 29-31, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SmartGridComm.2018.8587461},
  doi          = {10.1109/SMARTGRIDCOMM.2018.8587461},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/JameiSP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-04014,
  author       = {Mahdi Jamei and
                  Anna Scaglione and
                  Sean Peisert},
  title        = {Low-Resolution Fault Localization Using Phasor Measurement Units with
                  Community Detection},
  journal      = {CoRR},
  volume       = {abs/1809.04014},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.04014},
  eprinttype    = {arXiv},
  eprint       = {1809.04014},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-04014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Peisert17,
  author       = {Sean Peisert},
  title        = {Security in high-performance computing environments},
  journal      = {Commun. {ACM}},
  volume       = {60},
  number       = {9},
  pages        = {72--80},
  year         = {2017},
  url          = {https://doi.org/10.1145/3096742},
  doi          = {10.1145/3096742},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/Peisert17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PeisertW17,
  author       = {Sean Peisert and
                  Von Welch},
  title        = {The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science
                  and Cybersecurity},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {5},
  pages        = {94--95},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.3681058},
  doi          = {10.1109/MSP.2017.3681058},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PeisertW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OsterweilBCPSAC17,
  author       = {Leon J. Osterweil and
                  Matt Bishop and
                  Heather M. Conboy and
                  Huong Phan and
                  Borislava I. Simidchieva and
                  George S. Avrunin and
                  Lori A. Clarke and
                  Sean Peisert},
  title        = {Iterative Analysis to Improve Key Properties of Critical Human-Intensive
                  Processes: An Election Security Example},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {5:1--5:31},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041041},
  doi          = {10.1145/3041041},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/OsterweilBCPSAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdata/GonzalezLPTBRS17,
  author       = {Alberto Gonzalez and
                  Jason Leigh and
                  Sean Peisert and
                  Brian Tierney and
                  Edward Balas and
                  Predrag Radulovic and
                  Jennifer M. Schopf},
  editor       = {George Karypis and
                  Jia Zhang},
  title        = {Big Data and Analysis of Data Transfers for International Research
                  Networks Using NetSage},
  booktitle    = {2017 {IEEE} International Congress on Big Data, BigData Congress 2017,
                  Honolulu, HI, USA, June 25-30, 2017},
  pages        = {344--351},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/BigDataCongress.2017.51},
  doi          = {10.1109/BIGDATACONGRESS.2017.51},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdata/GonzalezLPTBRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/JameiSRSPMM17,
  author       = {Mahdi Jamei and
                  Anna Scaglione and
                  Ciaran M. Roberts and
                  Emma M. Stewart and
                  Sean Peisert and
                  Chuck McParland and
                  Alex McEachern},
  editor       = {Tung Bui},
  title        = {Automated Anomaly Detection in Distribution Grids Using uPMU Measurements},
  booktitle    = {50th Hawaii International Conference on System Sciences, {HICSS} 2017,
                  Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017},
  pages        = {1--10},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2017},
  url          = {https://hdl.handle.net/10125/41543},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/JameiSRSPMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PeisertBT17,
  author       = {Sean Peisert and
                  Matt Bishop and
                  Edward B. Talbot},
  title        = {A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability
                  Information Sharing},
  booktitle    = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
                  Santa Cruz, CA, USA, October 01-04, 2017},
  pages        = {80--89},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171533.3171536},
  doi          = {10.1145/3171533.3171536},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/PeisertBT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/GanzP17,
  author       = {Jonathan Ganz and
                  Sean Peisert},
  title        = {{ASLR:} How Robust Is the Randomness?},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {34--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.19},
  doi          = {10.1109/SECDEV.2017.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/GanzP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/StewartTCDBLRHP17,
  author       = {Emma M. Stewart and
                  Philip Top and
                  Michael Chertkov and
                  Deepjyoti Deka and
                  Scott Backhaus and
                  Andrey Y. Lokhov and
                  Ciaran M. Roberts and
                  Val Hendrix and
                  Sean Peisert and
                  Anthony Florita and
                  Thomas J. King and
                  Matthew J. Reno},
  title        = {Integrated multi-scale data analytics and machine learning for the
                  distribution grid},
  booktitle    = {2017 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2017, Dresden, Germany, October 23-27, 2017},
  pages        = {423--429},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SmartGridComm.2017.8340693},
  doi          = {10.1109/SMARTGRIDCOMM.2017.8340693},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/StewartTCDBLRHP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-00118,
  author       = {Mahdi Jamei and
                  Anna Scaglione and
                  Ciaran M. Roberts and
                  Emma M. Stewart and
                  Sean Peisert and
                  Chuck McParland and
                  Alex McEachern},
  title        = {Anomaly Detection Using Optimally-Placed Micro-PMU Sensors in Distribution
                  Grids},
  journal      = {CoRR},
  volume       = {abs/1708.00118},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.00118},
  eprinttype    = {arXiv},
  eprint       = {1708.00118},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-00118.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/JameiSPSMRM16,
  author       = {Mahdi Jamei and
                  Emma M. Stewart and
                  Sean Peisert and
                  Anna Scaglione and
                  Chuck McParland and
                  Ciaran M. Roberts and
                  Alex McEachern},
  title        = {Micro Synchrophasor-Based Intrusion Detection in Automated Distribution
                  Systems: Toward Critical Infrastructure Security},
  journal      = {{IEEE} Internet Comput.},
  volume       = {20},
  number       = {5},
  pages        = {18--27},
  year         = {2016},
  url          = {https://doi.org/10.1109/MIC.2016.102},
  doi          = {10.1109/MIC.2016.102},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/JameiSPSMRM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jamia/PeisertBDCGTBST16,
  author       = {Sean Peisert and
                  William Barnett and
                  Eli Dart and
                  James Cuff and
                  Robert L. Grossman and
                  Edward B. Talbot and
                  Ari Berman and
                  Anurag Shankar and
                  Brian Tierney},
  title        = {The Medical Science {DMZ}},
  journal      = {J. Am. Medical Informatics Assoc.},
  volume       = {23},
  number       = {6},
  pages        = {1199--1201},
  year         = {2016},
  url          = {https://doi.org/10.1093/jamia/ocw032},
  doi          = {10.1093/JAMIA/OCW032},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jamia/PeisertBDCGTBST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JameiSRSPMM16,
  author       = {Mahdi Jamei and
                  Anna Scaglione and
                  Ciaran M. Roberts and
                  Emma M. Stewart and
                  Sean Peisert and
                  Chuck McParland and
                  Alex McEachern},
  title        = {Automated Anomaly Detection in Distribution Grids Using {\(\mu\)}PMU
                  Measurements},
  journal      = {CoRR},
  volume       = {abs/1610.01107},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.01107},
  eprinttype    = {arXiv},
  eprint       = {1610.01107},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JameiSRSPMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DuanPL15,
  author       = {Sisi Duan and
                  Sean Peisert and
                  Karl N. Levitt},
  title        = {hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {1},
  pages        = {58--70},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2312331},
  doi          = {10.1109/TDSC.2014.2312331},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DuanPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KoutsandriaGJSP15,
  author       = {Georgia Koutsandria and
                  Reinhard Gentz and
                  Mahdi Jamei and
                  Anna Scaglione and
                  Sean Peisert and
                  Chuck McParland},
  editor       = {Indrajit Ray and
                  Roshan K. Thomas and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {A Real-Time Testbed Environment for Cyber-Physical Security on the
                  Power Grid},
  booktitle    = {Proceedings of the First {ACM} Workshop on Cyber-Physical Systems-Security
                  and/or PrivaCy, {CPS-SPC} 2015, Denver, Colorado, USA, October 16,
                  2015},
  pages        = {67--78},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808705.2808707},
  doi          = {10.1145/2808705.2808707},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KoutsandriaGJSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/ChavezSP15,
  author       = {Adrian R. Chavez and
                  William M. S. Stout and
                  Sean Peisert},
  title        = {Techniques for the dynamic randomization of network attributes},
  booktitle    = {International Carnahan Conference on Security Technology, {ICCST}
                  2015, Taipei, Taiwan, September 21-24, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CCST.2015.7389661},
  doi          = {10.1109/CCST.2015.7389661},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/ChavezSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idcs/DuanSP15,
  author       = {Sisi Duan and
                  Jingtao Sun and
                  Sean Peisert},
  editor       = {Giuseppe Di Fatta and
                  Giancarlo Fortino and
                  Wenfeng Li and
                  Mukaddim Pathan and
                  Frederic T. Stahl and
                  Antonio Guerrieri},
  title        = {Towards a Self-Adaptive Middleware for Building Reliable Publish/Subscribe
                  Systems},
  booktitle    = {Internet and Distributed Computing Systems - 8th International Conference,
                  {IDCS} 2015, Windsor, UK, September 2-4, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9258},
  pages        = {157--168},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23237-9\_14},
  doi          = {10.1007/978-3-319-23237-9\_14},
  timestamp    = {Sat, 10 Sep 2022 20:50:33 +0200},
  biburl       = {https://dblp.org/rec/conf/idcs/DuanSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/NeumannPS14,
  author       = {Peter G. Neumann and
                  Sean Peisert and
                  Marvin Schaefer},
  title        = {The {IEEE} Symposium on Security and Privacy, in Retrospect},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {15--17},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.59},
  doi          = {10.1109/MSP.2014.59},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/NeumannPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PeisertMNKS14,
  author       = {Sean Peisert and
                  Jonathan Margulies and
                  David M. Nicol and
                  Himanshu Khurana and
                  Chris Sawall},
  title        = {Designed-in Security for Cyber-Physical Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {9--12},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.90},
  doi          = {10.1109/MSP.2014.90},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PeisertMNKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PeisertM14,
  author       = {Sean Peisert and
                  Jonathan Margulies},
  title        = {Closing the Gap on Securing Energy Sector Control Systems [Guest editors'
                  introduction]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {13--14},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.110},
  doi          = {10.1109/MSP.2014.110},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PeisertM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McParlandPS14,
  author       = {Chuck McParland and
                  Sean Peisert and
                  Anna Scaglione},
  title        = {Monitoring Security of Networked Control Systems: It's the Physics},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {32--39},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.122},
  doi          = {10.1109/MSP.2014.122},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McParlandPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PeisertMBDPT14,
  author       = {Sean Peisert and
                  Jonathan Margulies and
                  Eric Byres and
                  Paul Dorey and
                  Dale Peterson and
                  Zach Tudor},
  title        = {Control Systems Security from the Front Lines},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {55--58},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.112},
  doi          = {10.1109/MSP.2014.112},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PeisertMBDPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/debs/ChangDMPZ14,
  author       = {Tiancheng Chang and
                  Sisi Duan and
                  Hein Meling and
                  Sean Peisert and
                  Haibin Zhang},
  editor       = {Umesh Bellur and
                  Ravi Kothari},
  title        = {{P2S:} a fault-tolerant publish/subscribe infrastructure},
  booktitle    = {The 8th {ACM} International Conference on Distributed Event-Based
                  Systems, {DEBS} '14, Mumbai, India, May 26-29, 2014},
  pages        = {189--197},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611286.2611305},
  doi          = {10.1145/2611286.2611305},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/debs/ChangDMPZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ParvaniaKMPMS14,
  author       = {Masood Parvania and
                  Georgia Koutsandria and
                  Vishak Muthukumar and
                  Sean Peisert and
                  Chuck McParland and
                  Anna Scaglione},
  title        = {Hybrid Control Network Intrusion Detection Systems for Automated Power
                  Distribution Systems},
  booktitle    = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014},
  pages        = {774--779},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DSN.2014.81},
  doi          = {10.1109/DSN.2014.81},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/ParvaniaKMPMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/opodis/DuanMPZ14,
  author       = {Sisi Duan and
                  Hein Meling and
                  Sean Peisert and
                  Haibin Zhang},
  editor       = {Marcos K. Aguilera and
                  Leonardo Querzoni and
                  Marc Shapiro},
  title        = {BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration},
  booktitle    = {Principles of Distributed Systems - 18th International Conference,
                  {OPODIS} 2014, Cortina d'Ampezzo, Italy, December 16-19, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8878},
  pages        = {91--106},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14472-6\_7},
  doi          = {10.1007/978-3-319-14472-6\_7},
  timestamp    = {Mon, 15 Jun 2020 17:10:01 +0200},
  biburl       = {https://dblp.org/rec/conf/opodis/DuanMPZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/KoutsandriaMPPMS14,
  author       = {Georgia Koutsandria and
                  Vishak Muthukumar and
                  Masood Parvania and
                  Sean Peisert and
                  Chuck McParland and
                  Anna Scaglione},
  title        = {A hybrid network {IDS} for protective digital relays in the power
                  transmission grid},
  booktitle    = {2014 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2014, Venice, Italy, November 3-6, 2014},
  pages        = {908--913},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SmartGridComm.2014.7007764},
  doi          = {10.1109/SMARTGRIDCOMM.2014.7007764},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/KoutsandriaMPPMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BishopCPSACOP14,
  author       = {Matt Bishop and
                  Heather M. Conboy and
                  Huong Phan and
                  Borislava I. Simidchieva and
                  George S. Avrunin and
                  Lori A. Clarke and
                  Leon J. Osterweil and
                  Sean Peisert},
  title        = {Insider Threat Identification by Process Analysis},
  booktitle    = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA,
                  USA, May 17-18, 2014},
  pages        = {251--264},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SPW.2014.40},
  doi          = {10.1109/SPW.2014.40},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BishopCPSACOP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/DuanLMPZ14,
  author       = {Sisi Duan and
                  Karl N. Levitt and
                  Hein Meling and
                  Sean Peisert and
                  Haibin Zhang},
  title        = {ByzID: Byzantine Fault Tolerance from Intrusion Detection},
  booktitle    = {33rd {IEEE} International Symposium on Reliable Distributed Systems,
                  {SRDS} 2014, Nara, Japan, October 6-9, 2014},
  pages        = {253--264},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SRDS.2014.28},
  doi          = {10.1109/SRDS.2014.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/DuanLMPZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/WhalenPB13,
  author       = {Sean Whalen and
                  Sean Peisert and
                  Matt Bishop},
  title        = {Multiclass classification of distributed memory parallel computations},
  journal      = {Pattern Recognit. Lett.},
  volume       = {34},
  number       = {3},
  pages        = {322--329},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.patrec.2012.10.007},
  doi          = {10.1016/J.PATREC.2012.10.007},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/prl/WhalenPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PeisertTK13,
  author       = {Sean Peisert and
                  Edward B. Talbot and
                  Tom M. Kroeger},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Principles of authentication},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {47--56},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535819},
  doi          = {10.1145/2535813.2535819},
  timestamp    = {Sat, 11 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/PeisertTK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BishopP12,
  author       = {Matt Bishop and
                  Sean Peisert},
  title        = {Security and Elections},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {5},
  pages        = {64--67},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2012.127},
  doi          = {10.1109/MSP.2012.127},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BishopP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpca/WhalenEPB12,
  author       = {Sean Whalen and
                  Sophie Engle and
                  Sean Peisert and
                  Matt Bishop},
  title        = {Network-theoretic classification of parallel computation patterns},
  journal      = {Int. J. High Perform. Comput. Appl.},
  volume       = {26},
  number       = {2},
  pages        = {159--169},
  year         = {2012},
  url          = {https://doi.org/10.1177/1094342012436618},
  doi          = {10.1177/1094342012436618},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpca/WhalenEPB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/WangLMSPM12,
  author       = {Zhifang Wang and
                  Xiao Li and
                  Vishak Muthukumar and
                  Anna Scaglione and
                  Sean Peisert and
                  Chuck McParland},
  title        = {Networked loads in the distribution grid},
  booktitle    = {Asia-Pacific Signal and Information Processing Association Annual
                  Summit and Conference, {APSIPA} 2012, Hollywood, CA, USA, December
                  3-6, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6411875/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apsipa/WangLMSPM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PeisertTB12,
  author       = {Sean Peisert and
                  Edward B. Talbot and
                  Matt Bishop},
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {Turtles all the way down: a clean-slate, ground-up, first-principles
                  approach to secure systems},
  booktitle    = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  pages        = {15--26},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413296.2413299},
  doi          = {10.1145/2413296.2413299},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/PeisertTB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2012cset,
  editor       = {Sean Peisert and
                  Stephen Schwab},
  title        = {5th Workshop on Cyber Security Experimentation and Test, {CSET} '12,
                  Bellevue, WA, USA, August 6, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/cset12},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2012cset.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/Coles-KempGGPP12,
  author       = {Lizzie Coles{-}Kemp and
                  Carrie Gates and
                  Dieter Gollmann and
                  Sean Peisert and
                  Christian W. Probst},
  title        = {Organizational Processes for Supporting Sustainable Security (Dagstuhl
                  Seminar 12501)},
  journal      = {Dagstuhl Reports},
  volume       = {2},
  number       = {12},
  pages        = {37--48},
  year         = {2012},
  url          = {https://doi.org/10.4230/DagRep.2.12.37},
  doi          = {10.4230/DAGREP.2.12.37},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/Coles-KempGGPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2011,
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {http://dl.acm.org/citation.cfm?id=2073276},
  isbn         = {978-1-4503-1078-9},
  timestamp    = {Tue, 13 Nov 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2011cset,
  editor       = {Sean Peisert and
                  Stephen Schwab},
  title        = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11,
                  San Francisco, CA, USA, August 8, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/cset11},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2011cset.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BishopCPSBAFH10,
  author       = {Matt Bishop and
                  Justin Cummins and
                  Sean Peisert and
                  Anhad Singh and
                  Bhume Bhumiratana and
                  Deborah A. Agarwal and
                  Deborah A. Frincke and
                  Michael A. Hogarth},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {Relationships and data sanitization: a study in scarlet},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {151--164},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900567},
  doi          = {10.1145/1900546.1900567},
  timestamp    = {Mon, 28 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/BishopCPSBAFH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NeumannBPS10,
  author       = {Peter G. Neumann and
                  Matt Bishop and
                  Sean Peisert and
                  Marv Schaefer},
  title        = {Reflections on the 30th Anniversary of the {IEEE} Symposium on Security
                  and Privacy},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {3--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.43},
  doi          = {10.1109/SP.2010.43},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/NeumannBPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SimidchievaECJPBCO10,
  author       = {Borislava I. Simidchieva and
                  Sophie Engle and
                  Michael Clifford and
                  Alicia Clay Jones and
                  Sean Peisert and
                  Matt Bishop and
                  Lori A. Clarke and
                  Leon J. Osterweil},
  editor       = {Douglas W. Jones and
                  Jean{-}Jacques Quisquater and
                  Eric Rescorla},
  title        = {Modeling and Analyzing Faults to Improve Election Process Robustness},
  booktitle    = {2010 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '10, Washington, D.C., USA, August 9-10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/evtwote-10/modeling-and-analyzing-faults-improve-election-process-robustness},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SimidchievaECJPBCO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BishopEFGGPW10,
  author       = {Matt Bishop and
                  Sophie Engle and
                  Deborah A. Frincke and
                  Carrie Gates and
                  Frank L. Greitzer and
                  Sean Peisert and
                  Sean Whalen},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {A Risk Management Approach to the "Insider Threat"},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {115--137},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_6},
  doi          = {10.1007/978-1-4419-7133-3\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BishopEFGGPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2010,
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546},
  doi          = {10.1145/1900546},
  isbn         = {978-1-4503-0415-3},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/BishopEPWG09,
  author       = {Matt Bishop and
                  Sophie Engle and
                  Sean Peisert and
                  Sean Whalen and
                  Carrie Gates},
  title        = {Case Studies of an Insider Framework},
  booktitle    = {42st Hawaii International International Conference on Systems Science
                  {(HICSS-42} 2009), Proceedings {(CD-ROM} and online), 5-8 January
                  2009, Waikoloa, Big Island, HI, {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HICSS.2009.104},
  doi          = {10.1109/HICSS.2009.104},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/BishopEPWG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/PeisertBY09,
  author       = {Sean Peisert and
                  Matt Bishop and
                  Alec Yasinsac},
  title        = {Vote Selling, Voter Anonymity, and Forensic Logging of Electronic
                  Voting Machines},
  booktitle    = {42st Hawaii International International Conference on Systems Science
                  {(HICSS-42} 2009), Proceedings {(CD-ROM} and online), 5-8 January
                  2009, Waikoloa, Big Island, HI, {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HICSS.2009.503},
  doi          = {10.1109/HICSS.2009.503},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/PeisertBY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PeisertBCG09,
  author       = {Sean Peisert and
                  Matt Bishop and
                  Laura Corriss and
                  Steven J. Greenwald},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security
                  paradigms with appreciation to the Roman poet Juvenal},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {71--84},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719041},
  doi          = {10.1145/1719030.1719041},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/PeisertBCG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/WestVLP09,
  author       = {Jean West and
                  Ulf Lindqvist and
                  Peter J. Vasquez and
                  Michael Losavio and
                  Sean Peisert},
  title        = {Panel: Technical, Social and Legal Frameworks for Digital Forensics
                  and CyberInfrastructure Security},
  booktitle    = {Fourth International {IEEE} Workshop on Systematic Approaches to Digital
                  Forensic Engineering, {SADFE} 2009, Berkeley, California, USA, May
                  21, 2009},
  pages        = {97--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SADFE.2009.11},
  doi          = {10.1109/SADFE.2009.11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sadfe/WestVLP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BishopPHG09,
  author       = {Matt Bishop and
                  Sean Peisert and
                  Candice Hoke and
                  Mark Graff},
  editor       = {David Jefferson and
                  Joseph Lorenzo Hall and
                  Tal Moran},
  title        = {E-Voting and Forensics: Prying Open the Black Box},
  booktitle    = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/evtwote-09/e-voting-and-forensics-prying-open-black-box},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BishopPHG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BishopEPWG08,
  author       = {Matt Bishop and
                  Sophie Engle and
                  Sean Peisert and
                  Sean Whalen and
                  Carrie Gates},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {We have met the enemy and he is us},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595678},
  doi          = {10.1145/1595676.1595678},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/BishopEPWG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/PeisertBM08,
  author       = {Sean Peisert and
                  Matt Bishop and
                  Keith Marzullo},
  title        = {Computer Forensics in Forensis},
  booktitle    = {Third International Workshop on Systematic Approaches to Digital Forensic
                  Engineering, {SADFE} 2008, Berkeley, California, USA, May 22, 2008},
  pages        = {102--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SADFE.2008.18},
  doi          = {10.1109/SADFE.2008.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/PeisertBM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Peisert07,
  author       = {Sean Peisert},
  title        = {A model of forensic analysis using goal-oriented logging},
  school       = {University of California, San Diego, {USA}},
  year         = {2007},
  url          = {http://www.escholarship.org/uc/item/4p5550kn},
  timestamp    = {Tue, 28 Mar 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Peisert07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PeisertB07,
  author       = {Sean Peisert and
                  Matt Bishop},
  title        = {I Am a Scientist, Not a Philosopher!},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {4},
  pages        = {48--51},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.84},
  doi          = {10.1109/MSP.2007.84},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PeisertB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PeisertBKM07,
  author       = {Sean Peisert and
                  Matt Bishop and
                  Sidney Karin and
                  Keith Marzullo},
  title        = {Analysis of Computer Intrusions Using Sequences of Function Calls},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {2},
  pages        = {137--150},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.1003},
  doi          = {10.1109/TDSC.2007.1003},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PeisertBKM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-8/PeisertB07,
  author       = {Sean Peisert and
                  Matt Bishop},
  editor       = {Lynn Futcher and
                  Ronald Dodge},
  title        = {How to Design Computer Security Experiments},
  booktitle    = {Fifth World Conference on Information Security Education, Proceedings
                  of the {IFIP} {TC11} {WG} 11.8, {WISE} 5, 19 to 21 June 2007, United
                  States Military Academy, West Point, New York, {USA}},
  series       = {{IFIP}},
  volume       = {237},
  pages        = {141--148},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-73269-5\_19},
  doi          = {10.1007/978-0-387-73269-5\_19},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-8/PeisertB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/PeisertBKM07,
  author       = {Sean Peisert and
                  Matt Bishop and
                  Sidney Karin and
                  Keith Marzullo},
  editor       = {Ming{-}Yuh Huang and
                  Deborah A. Frincke},
  title        = {Toward Models for Forensic Analysis},
  booktitle    = {Second International Workshop on Systematic Approaches to Digital
                  Forensic Engineering, {SADFE} 2007, Seattle, Washington, USA, April
                  10-12, 2007},
  pages        = {3--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SADFE.2007.23},
  doi          = {10.1109/SADFE.2007.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/PeisertBKM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Peisert05,
  author       = {Sean Peisert},
  title        = {Forensics for System Administrators},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/forensics-system-administrators},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Peisert05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PeisertKBM05,
  author       = {Sean Peisert and
                  Sidney Karin and
                  Matt Bishop and
                  Keith Marzullo},
  editor       = {Simon N. Foley},
  title        = {Principles-driven forensic analysis},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {85--93},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146291},
  doi          = {10.1145/1146269.1146291},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/PeisertKBM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}