default search action
BibTeX records: Sean Peisert
@inproceedings{DBLP:conf/icassp/LiuSP24, author = {Hang Liu and Anna Scaglione and Sean Peisert}, title = {Privacy Leakage In Graph Signal To Graph Matching Problems}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024}, pages = {9371--9375}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICASSP48485.2024.10447364}, doi = {10.1109/ICASSP48485.2024.10447364}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/LiuSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-02324, author = {Nikhil Ravi and Anna Scaglione and Sean Peisert and Parth Pradhan}, title = {Differentially Private Communication of Measurement Anomalies in the Smart Grid}, journal = {CoRR}, volume = {abs/2403.02324}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.02324}, doi = {10.48550/ARXIV.2403.02324}, eprinttype = {arXiv}, eprint = {2403.02324}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-02324.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Peisert23, author = {Sean Peisert}, title = {The First 20 Years of {IEEE} Security {\&} Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {4--6}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3236420}, doi = {10.1109/MSEC.2023.3236420}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Peisert23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Peisert23a, author = {Sean Peisert}, title = {On Software Infrastructure: Develop, Prove, Profit?}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {4--8}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3273492}, doi = {10.1109/MSEC.2023.3273492}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Peisert23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RamakrishnaSWRP23, author = {Raksha Ramakrishna and Anna Scaglione and Tong Wu and Nikhil Ravi and Sean Peisert}, title = {Differential Privacy for Class-Based Data: {A} Practical Gaussian Mechanism}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {5096--5108}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3289128}, doi = {10.1109/TIFS.2023.3289128}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RamakrishnaSWRP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/WuSSAP23, author = {Tong Wu and Anna Scaglione and Adrian Petru Surani and Daniel B. Arnold and Sean Peisert}, title = {Network-Constrained Reinforcement Learning for Optimal {EV} Charging Control}, booktitle = {{IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm IEEE, Glasgow, United Kingdom, October 31 - November 3, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SmartGridComm57358.2023.10333926}, doi = {10.1109/SMARTGRIDCOMM57358.2023.10333926}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartgridcomm/WuSSAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartnets/KadamSRPLS23, author = {Sachin Kadam and Anna Scaglione and Nikhil Ravi and Sean Peisert and Brent Lunghino and Aram Shumavon}, title = {Optimum Noise Mechanism for Probabilistic Differentially Private Queries in Discrete Finite Sets}, booktitle = {International Conference on Smart Applications, Communications and Networking, SmartNets 2023, Istanbul, Turkey, July 25-27, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SmartNets58706.2023.10215578}, doi = {10.1109/SMARTNETS58706.2023.10215578}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartnets/KadamSRPLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-03749, author = {Nikhil Ravi and Anna Scaglione and Julieta Giraldez and Parth Pradhan and Chuck Moran and Sean Peisert}, title = {Solar Photovoltaic Systems Metadata Inference and Differentially Private Publication}, journal = {CoRR}, volume = {abs/2304.03749}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.03749}, doi = {10.48550/ARXIV.2304.03749}, eprinttype = {arXiv}, eprint = {2304.03749}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-03749.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-05578, author = {Raksha Ramakrishna and Anna Scaglione and Tong Wu and Nikhil Ravi and Sean Peisert}, title = {Differential Privacy for Class-based Data: {A} Practical Gaussian Mechanism}, journal = {CoRR}, volume = {abs/2306.05578}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.05578}, doi = {10.48550/ARXIV.2306.05578}, eprinttype = {arXiv}, eprint = {2306.05578}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-05578.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Peisert22, author = {Sean Peisert}, title = {Unsafe at Any Clock Speed: The Insecurity of Computer System Design, Implementation, and Operation}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {1}, pages = {4--9}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2021.3127086}, doi = {10.1109/MSEC.2021.3127086}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Peisert22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/RaviSKGPLLS22, author = {Nikhil Ravi and Anna Scaglione and Sachin Kadam and Reinhard Gentz and Sean Peisert and Brent Lunghino and Emmanuel Levijarvi and Aram Shumavon}, title = {Differentially Private -Means Clustering Applied to Meter Data Analysis and Synthesis}, journal = {{IEEE} Trans. Smart Grid}, volume = {13}, number = {6}, pages = {4801--4814}, year = {2022}, url = {https://doi.org/10.1109/TSG.2022.3184252}, doi = {10.1109/TSG.2022.3184252}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/RaviSKGPLLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HaydariCZMP22, author = {Ammar Haydari and Chen{-}Nee Chuah and H. Michael Zhang and Jane MacFarlane and Sean Peisert}, title = {Differentially Private Map Matching for Mobility Trajectories}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {293--303}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567974}, doi = {10.1145/3564625.3567974}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HaydariCZMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/ArnoldNRCSP22, author = {Daniel Arnold and Sy{-}Toan Ngo and Ciaran M. Roberts and Yize Chen and Anna Scaglione and Sean Peisert}, title = {Adam-based Augmented Random Search for Control Policies for Distributed Energy Resource Cyber Attack Mitigation}, booktitle = {American Control Conference, {ACC} 2022, Atlanta, GA, USA, June 8-10, 2022}, pages = {4559--4566}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/ACC53348.2022.9867545}, doi = {10.23919/ACC53348.2022.9867545}, timestamp = {Mon, 06 Nov 2023 12:57:51 +0100}, biburl = {https://dblp.org/rec/conf/amcc/ArnoldNRCSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seed/AkramAPL22, author = {Ayaz Akram and Venkatesh Akella and Sean Peisert and Jason Lowe{-}Power}, title = {SoK: Limitations of Confidential Computing via TEEs for High-Performance Compute Systems}, booktitle = {2022 {IEEE} International Symposium on Secure and Private Execution Environment Design (SEED), Storrs, CT, USA, September 26-27, 2022}, pages = {121--132}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SEED55351.2022.00018}, doi = {10.1109/SEED55351.2022.00018}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seed/AkramAPL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-11825, author = {Daniel B. Arnold and Sy{-}Toan Ngo and Ciaran M. Roberts and Yize Chen and Anna Scaglione and Sean Peisert}, title = {Adam-based Augmented Random Search for Control Policies for Distributed Energy Resource Cyber Attack Mitigation}, journal = {CoRR}, volume = {abs/2201.11825}, year = {2022}, url = {https://arxiv.org/abs/2201.11825}, eprinttype = {arXiv}, eprint = {2201.11825}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-11825.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-05373, author = {Daniel B. Arnold and Shammya Saha and Sy{-}Toan Ngo and Ciaran M. Roberts and Anna Scaglione and Nathan G. Johnson and Sean Peisert and David Pinney}, title = {Adaptive Control of Distributed Energy Resources for Distribution Grid Voltage Stability}, journal = {CoRR}, volume = {abs/2202.05373}, year = {2022}, url = {https://arxiv.org/abs/2202.05373}, eprinttype = {arXiv}, eprint = {2202.05373}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-05373.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Peisert21, author = {Sean Peisert}, title = {Trustworthy scientific computing}, journal = {Commun. {ACM}}, volume = {64}, number = {5}, pages = {18--21}, year = {2021}, url = {https://doi.org/10.1145/3457191}, doi = {10.1145/3457191}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/Peisert21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Peisert21, author = {Sean Peisert}, title = {Reflections on the Past, Perspectives on the Future [From the Editors]}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {4--7}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3034670}, doi = {10.1109/MSEC.2020.3034670}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Peisert21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PeisertSOMBLMMP21, author = {Sean Peisert and Bruce Schneier and Hamed Okhravi and Fabio Massacci and Terry Benzel and Carl E. Landwehr and Mohammad Mannan and Jelena Mirkovic and Atul Prakash and James Bret Michael}, title = {Perspectives on the SolarWinds Incident}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {7--13}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3051235}, doi = {10.1109/MSEC.2021.3051235}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/PeisertSOMBLMMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MassacciJP21, author = {Fabio Massacci and Trent Jaeger and Sean Peisert}, title = {SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {14--19}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3050433}, doi = {10.1109/MSEC.2021.3050433}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MassacciJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/RobertsNMSPA21, author = {Ciaran M. Roberts and Sy{-}Toan Ngo and Alexandre Milesi and Anna Scaglione and Sean Peisert and Daniel B. Arnold}, title = {Deep Reinforcement Learning for Mitigating Cyber-Physical {DER} Voltage Unbalance Attacks}, booktitle = {2021 American Control Conference, {ACC} 2021, New Orleans, LA, USA, May 25-28, 2021}, pages = {2861--2867}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/ACC50511.2021.9482815}, doi = {10.23919/ACC50511.2021.9482815}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/RobertsNMSPA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ClavinHWPDWP21, author = {James R. Clavin and Yue Huang and Xin Wang and Pradeep M. Prakash and Sisi Duan and Jianwu Wang and Sean Peisert}, title = {A Framework for Evaluating {BFT}}, booktitle = {27th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2021, Beijing, China, December 14-16, 2021}, pages = {193--200}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICPADS53394.2021.00030}, doi = {10.1109/ICPADS53394.2021.00030}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpads/ClavinHWPDWP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/AkramGALP21, author = {Ayaz Akram and Anna Giannakou and Venkatesh Akella and Jason Lowe{-}Power and Sean Peisert}, title = {Performance Analysis of Scientific Computing Workloads on General Purpose TEEs}, booktitle = {35th {IEEE} International Parallel and Distributed Processing Symposium, {IPDPS} 2021, Portland, OR, USA, May 17-21, 2021}, pages = {1066--1076}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IPDPS49936.2021.00115}, doi = {10.1109/IPDPS49936.2021.00115}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/AkramGALP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-04983, author = {Yize Chen and Daniel B. Arnold and Yuanyuan Shi and Sean Peisert}, title = {Understanding the Safety Requirements for Learning-based Power Systems Operations}, journal = {CoRR}, volume = {abs/2110.04983}, year = {2021}, url = {https://arxiv.org/abs/2110.04983}, eprinttype = {arXiv}, eprint = {2110.04983}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-04983.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-07850, author = {Nikhil Ravi and Anna Scaglione and Sean Peisert}, title = {Colored Noise Mechanism for Differentially Private Clustering}, journal = {CoRR}, volume = {abs/2111.07850}, year = {2021}, url = {https://arxiv.org/abs/2111.07850}, eprinttype = {arXiv}, eprint = {2111.07850}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-07850.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-11661, author = {Sachin Kadam and Anna Scaglione and Nikhil Ravi and Sean Peisert and Brent Lunghino and Aram Shumavon}, title = {Optimum Noise Mechanism for Differentially Private Queries in Discrete Finite Sets}, journal = {CoRR}, volume = {abs/2111.11661}, year = {2021}, url = {https://arxiv.org/abs/2111.11661}, eprinttype = {arXiv}, eprint = {2111.11661}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-11661.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-13786, author = {Luca Pion{-}Tonachini and Kristofer E. Bouchard and H{\'{e}}ctor Garc{\'{\i}}a Mart{\'{\i}}n and Sean Peisert and W. Bradley Holtz and Anil Aswani and Dipankar Dwivedi and Haruko M. Wainwright and Ghanshyam Pilania and Benjamin Nachman and Babetta L. Marrone and Nicola Falco and Prabhat and Daniel B. Arnold and Alejandro Wolf{-}Yadlin and Sarah Powers and Sharlee Climer and Quinn Jackson and Ty Carlson and Michael Sohn and Petrus H. Zwart and Neeraj Kumar and Amy Justice and Claire J. Tomlin and Daniel A. Jacobson and Gos Micklem and Georgios V. Gkoutos and Peter J. Bickel and Jean{-}Baptiste Cazier and Juliane M{\"{u}}ller and Bobbie{-}Jo Webb{-}Robertson and Rick Stevens and Mark Anderson and Kenneth Kreutz{-}Delgado and Michael W. Mahoney and James B. Brown}, title = {Learning from learning machines: a new generation of {AI} technology to meet the needs of science}, journal = {CoRR}, volume = {abs/2111.13786}, year = {2021}, url = {https://arxiv.org/abs/2111.13786}, eprinttype = {arXiv}, eprint = {2111.13786}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-13786.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-15152, author = {Yize Chen and Yuanyuan Shi and Daniel B. Arnold and Sean Peisert}, title = {{SAVER:} Safe Learning-Based Controller for Real-Time Voltage Regulation}, journal = {CoRR}, volume = {abs/2111.15152}, year = {2021}, url = {https://arxiv.org/abs/2111.15152}, eprinttype = {arXiv}, eprint = {2111.15152}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-15152.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-08487, author = {Ammar Haydari and H. Michael Zhang and Chen{-}Nee Chuah and Jane MacFarlane and Sean Peisert}, title = {Adaptive Differential Privacy Mechanism for Aggregated Mobility Dataset}, journal = {CoRR}, volume = {abs/2112.08487}, year = {2021}, url = {https://arxiv.org/abs/2112.08487}, eprinttype = {arXiv}, eprint = {2112.08487}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-08487.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/GiannakouDP20, author = {Anna Giannakou and Dipankar Dwivedi and Sean Peisert}, title = {A machine learning approach for packet loss prediction in science flows}, journal = {Future Gener. Comput. Syst.}, volume = {102}, pages = {190--197}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.07.053}, doi = {10.1016/J.FUTURE.2019.07.053}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/GiannakouDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Peisert20, author = {Sean Peisert}, title = {Isolating Insecurely: {A} Call to Arms for the Security and Privacy Community During the Time of {COVID-19}}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {4}, pages = {4--7}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2020.2992316}, doi = {10.1109/MSEC.2020.2992316}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Peisert20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/JameiRTGRSP20, author = {Mahdi Jamei and Raksha Ramakrishna and Teklemariam Tesfay and Reinhard Gentz and Ciaran M. Roberts and Anna Scaglione and Sean Peisert}, title = {Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {38}, number = {1}, pages = {180--192}, year = {2020}, url = {https://doi.org/10.1109/JSAC.2019.2951971}, doi = {10.1109/JSAC.2019.2951971}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/JameiRTGRSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/RobertsSJGPSMMA20, author = {Ciaran M. Roberts and Anna Scaglione and Mahdi Jamei and Reinhard Gentz and Sean Peisert and Emma M. Stewart and Chuck McParland and Alex McEachern and Daniel B. Arnold}, title = {Learning Behavior of Distribution System Discrete Control Devices for Cyber-Physical Security}, journal = {{IEEE} Trans. Smart Grid}, volume = {11}, number = {1}, pages = {749--761}, year = {2020}, url = {https://doi.org/10.1109/TSG.2019.2936016}, doi = {10.1109/TSG.2019.2936016}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/RobertsSJGPSMMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/GeganMGBP20, author = {Ross K. Gegan and Christina Mao and Dipak Ghosal and Matt Bishop and Sean Peisert}, title = {Anomaly Detection for Science DMZs Using System Performance Data}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2020, Big Island, HI, USA, February 17-20, 2020}, pages = {492--496}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICNC47757.2020.9049695}, doi = {10.1109/ICNC47757.2020.9049695}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccnc/GeganMGBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/CarrenoRSARNPP20, author = {Ignacio Losada Carreno and Raksha Ramakrishna and Anna Scaglione and Daniel B. Arnold and Ciaran M. Roberts and Sy{-}Toan Ngo and Sean Peisert and David Pinney}, title = {SoDa: An Irradiance-Based Synthetic Solar Data Generation Tool}, booktitle = {2020 {IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2020, Tempe, AZ, USA, November 11-13, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SmartGridComm47815.2020.9302941}, doi = {10.1109/SMARTGRIDCOMM47815.2020.9302941}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/CarrenoRSARNPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/RobertsNMPASSJK20, author = {Ciaran M. Roberts and Sy{-}Toan Ngo and Alexandre Milesi and Sean Peisert and Daniel B. Arnold and Shammya Saha and Anna Scaglione and Nathan G. Johnson and Anton Kocheturov and Dmitriy Fradkin}, title = {Deep Reinforcement Learning for {DER} Cyber-Attack Mitigation}, booktitle = {2020 {IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2020, Tempe, AZ, USA, November 11-13, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SmartGridComm47815.2020.9302997}, doi = {10.1109/SMARTGRIDCOMM47815.2020.9302997}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/RobertsNMPASSJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-03135, author = {Bogdan Copos and Sean Peisert}, title = {Catch Me If You Can: Using Power Analysis to Identify {HPC} Activity}, journal = {CoRR}, volume = {abs/2005.03135}, year = {2020}, url = {https://arxiv.org/abs/2005.03135}, eprinttype = {arXiv}, eprint = {2005.03135}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-03135.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-13088, author = {Ciaran M. Roberts and Sy{-}Toan Ngo and Alexandre Milesi and Sean Peisert and Daniel B. Arnold and Shammya Saha and Anna Scaglione and Nathan G. Johnson and Anton Kocheturov and Dmitriy Fradkin}, title = {Deep Reinforcement Learning for {DER} Cyber-Attack Mitigation}, journal = {CoRR}, volume = {abs/2009.13088}, year = {2020}, url = {https://arxiv.org/abs/2009.13088}, eprinttype = {arXiv}, eprint = {2009.13088}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-13088.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-13216, author = {Ayaz Akram and Anna Giannakou and Venkatesh Akella and Jason Lowe{-}Power and Sean Peisert}, title = {Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments}, journal = {CoRR}, volume = {abs/2010.13216}, year = {2020}, url = {https://arxiv.org/abs/2010.13216}, eprinttype = {arXiv}, eprint = {2010.13216}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-13216.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-09620, author = {Shammya Shananda Saha and Daniel Arnold and Anna Scaglione and Eran Schweitzer and Ciaran M. Roberts and Sean Peisert and Nathan G. Johnson}, title = {Lyapunov Stability of Smart Inverters Using Linearized DistFlow Approximation}, journal = {CoRR}, volume = {abs/2011.09620}, year = {2020}, url = {https://arxiv.org/abs/2011.09620}, eprinttype = {arXiv}, eprint = {2011.09620}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-09620.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Peisert19, author = {Sean Peisert}, title = {Some Experiences in Developing Security Technology That Actually Get Used}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {2}, pages = {4--7}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2899711}, doi = {10.1109/MSEC.2019.2899711}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Peisert19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/StockmanDGP19, author = {Melissa Stockman and Dipankar Dwivedi and Reinhard Gentz and Sean Peisert}, title = {Detecting control system misbehavior by fingerprinting programmable logic controller functionality}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {26}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.100306}, doi = {10.1016/J.IJCIP.2019.100306}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/StockmanDGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eScience/GentzPBG19, author = {Reinhard Gentz and Sean Peisert and Joshua Boverhof and Daniel Gunter}, title = {{SPARCS:} Stream-Processing Architecture Applied in Real-Time Cyber-Physical Security}, booktitle = {15th International Conference on eScience, eScience 2019, San Diego, CA, USA, September 24-27, 2019}, pages = {199--202}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eScience.2019.00028}, doi = {10.1109/ESCIENCE.2019.00028}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eScience/GentzPBG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eScience/GentzMBP19, author = {Reinhard Gentz and H{\'{e}}ctor Garc{\'{\i}}a Mart{\'{\i}}n and Edward Baidoo and Sean Peisert}, title = {Workflow Automation in Liquid Chromatography Mass Spectrometry}, booktitle = {15th International Conference on eScience, eScience 2019, San Diego, CA, USA, September 24-27, 2019}, pages = {638--639}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eScience.2019.00095}, doi = {10.1109/ESCIENCE.2019.00095}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eScience/GentzMBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/WonjigaPRM19, author = {Amir Teshome Wonjiga and Sean Peisert and Louis Rilling and Christine Morin}, editor = {Kenneth Johnson and Josef Spillner and Dalibor Klus{\'{a}}cek and Ashiq Anjum}, title = {Blockchain as a Trusted Component in Cloud {SLA} Verification}, booktitle = {Proceedings of the 12th {IEEE/ACM} International Conference on Utility and Cloud Computing, {UCC} 2019, Companion Volume, Auckland, New Zealand, December 2-5, 2019}, pages = {93--100}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368235.3368872}, doi = {10.1145/3368235.3368872}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ucc/WonjigaPRM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/xsede/AdamsABBCDFHHJK19, author = {Andrew K. Adams and Kay Avila and Jim Basney and Dana Brunson and Robert Cowles and Jeannette Dopheide and Terry Fleury and Elisa Heymann and Florence D. Hudson and Craig Jackson and Ryan Kiser and Mark Krenz and Jim Marsteller and Barton P. Miller and Sean Peisert and Scott Russell and Susan Sons and Von Welch and John Zage}, editor = {Thomas R. Furlani}, title = {Trusted {CI} Experiences in Cybersecurity and Service to Open Science}, booktitle = {Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning), {PEARC} 2019, Chicago, IL, USA, July 28 - August 01, 2019}, pages = {60}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3332186.3340601}, doi = {10.1145/3332186.3340601}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/xsede/AdamsABBCDFHHJK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-05383, author = {Andrew K. Adams and Kay Avila and Jim Basney and Dana Brunson and Robert Cowles and Jeannette Dopheide and Terry Fleury and Elisa Heymann and Florence D. Hudson and Craig Jackson and Ryan Kiser and Mark Krenz and Jim Marsteller and Barton P. Miller and Sean Peisert and Scott Russell and Susan Sons and Von Welch and John Zage}, title = {Trusted {CI} Experiences in Cybersecurity and Service to Open Science}, journal = {CoRR}, volume = {abs/1904.05383}, year = {2019}, url = {http://arxiv.org/abs/1904.05383}, eprinttype = {arXiv}, eprint = {1904.05383}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-05383.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BenzelP18, author = {Terry Benzel and Sean Peisert}, title = {Selected Papers from the 2017 {IEEE} Symposium on Security and Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {10--11}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331038}, doi = {10.1109/MSP.2018.1331038}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BenzelP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jamia/PeisertDBBCGBST18, author = {Sean Peisert and Eli Dart and William Barnett and Edward Balas and James Cuff and Robert L. Grossman and Ari Berman and Anurag Shankar and Brian Tierney}, title = {The medical science {DMZ:} a network design pattern for data-intensive medical science}, journal = {J. Am. Medical Informatics Assoc.}, volume = {25}, number = {3}, pages = {267--274}, year = {2018}, url = {https://doi.org/10.1093/jamia/ocx104}, doi = {10.1093/JAMIA/OCX104}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jamia/PeisertDBBCGBST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sc/GiannakouGP18, author = {Anna Giannakou and Daniel Gunter and Sean Peisert}, title = {Flowzilla: {A} Methodology for Detecting Data Transfer Anomalies in Research Networks}, booktitle = {Proceedings of the 5th {IEEE/ACM} International Workshop on Innovating the Network for Data-Intensive Science, INDIS@SC 2018, Dallas, TX, USA, November 11, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INDIS.2018.00004}, doi = {10.1109/INDIS.2018.00004}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sc/GiannakouGP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/JameiSP18, author = {Mahdi Jamei and Anna Scaglione and Sean Peisert}, title = {Low-Resolution Fault Localization Using Phasor Measurement Units with Community Detection}, booktitle = {2018 {IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018, Aalborg, Denmark, October 29-31, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SmartGridComm.2018.8587461}, doi = {10.1109/SMARTGRIDCOMM.2018.8587461}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/JameiSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-04014, author = {Mahdi Jamei and Anna Scaglione and Sean Peisert}, title = {Low-Resolution Fault Localization Using Phasor Measurement Units with Community Detection}, journal = {CoRR}, volume = {abs/1809.04014}, year = {2018}, url = {http://arxiv.org/abs/1809.04014}, eprinttype = {arXiv}, eprint = {1809.04014}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-04014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Peisert17, author = {Sean Peisert}, title = {Security in high-performance computing environments}, journal = {Commun. {ACM}}, volume = {60}, number = {9}, pages = {72--80}, year = {2017}, url = {https://doi.org/10.1145/3096742}, doi = {10.1145/3096742}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/Peisert17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PeisertW17, author = {Sean Peisert and Von Welch}, title = {The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {5}, pages = {94--95}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.3681058}, doi = {10.1109/MSP.2017.3681058}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PeisertW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OsterweilBCPSAC17, author = {Leon J. Osterweil and Matt Bishop and Heather M. Conboy and Huong Phan and Borislava I. Simidchieva and George S. Avrunin and Lori A. Clarke and Sean Peisert}, title = {Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {2}, pages = {5:1--5:31}, year = {2017}, url = {https://doi.org/10.1145/3041041}, doi = {10.1145/3041041}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/OsterweilBCPSAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdata/GonzalezLPTBRS17, author = {Alberto Gonzalez and Jason Leigh and Sean Peisert and Brian Tierney and Edward Balas and Predrag Radulovic and Jennifer M. Schopf}, editor = {George Karypis and Jia Zhang}, title = {Big Data and Analysis of Data Transfers for International Research Networks Using NetSage}, booktitle = {2017 {IEEE} International Congress on Big Data, BigData Congress 2017, Honolulu, HI, USA, June 25-30, 2017}, pages = {344--351}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/BigDataCongress.2017.51}, doi = {10.1109/BIGDATACONGRESS.2017.51}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdata/GonzalezLPTBRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/JameiSRSPMM17, author = {Mahdi Jamei and Anna Scaglione and Ciaran M. Roberts and Emma M. Stewart and Sean Peisert and Chuck McParland and Alex McEachern}, editor = {Tung Bui}, title = {Automated Anomaly Detection in Distribution Grids Using uPMU Measurements}, booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}, pages = {1--10}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2017}, url = {https://hdl.handle.net/10125/41543}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/JameiSRSPMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PeisertBT17, author = {Sean Peisert and Matt Bishop and Edward B. Talbot}, title = {A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing}, booktitle = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017, Santa Cruz, CA, USA, October 01-04, 2017}, pages = {80--89}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171533.3171536}, doi = {10.1145/3171533.3171536}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/PeisertBT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/GanzP17, author = {Jonathan Ganz and Sean Peisert}, title = {{ASLR:} How Robust Is the Randomness?}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {34--41}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.19}, doi = {10.1109/SECDEV.2017.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/GanzP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/StewartTCDBLRHP17, author = {Emma M. Stewart and Philip Top and Michael Chertkov and Deepjyoti Deka and Scott Backhaus and Andrey Y. Lokhov and Ciaran M. Roberts and Val Hendrix and Sean Peisert and Anthony Florita and Thomas J. King and Matthew J. Reno}, title = {Integrated multi-scale data analytics and machine learning for the distribution grid}, booktitle = {2017 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2017, Dresden, Germany, October 23-27, 2017}, pages = {423--429}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SmartGridComm.2017.8340693}, doi = {10.1109/SMARTGRIDCOMM.2017.8340693}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/StewartTCDBLRHP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-00118, author = {Mahdi Jamei and Anna Scaglione and Ciaran M. Roberts and Emma M. Stewart and Sean Peisert and Chuck McParland and Alex McEachern}, title = {Anomaly Detection Using Optimally-Placed Micro-PMU Sensors in Distribution Grids}, journal = {CoRR}, volume = {abs/1708.00118}, year = {2017}, url = {http://arxiv.org/abs/1708.00118}, eprinttype = {arXiv}, eprint = {1708.00118}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-00118.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/JameiSPSMRM16, author = {Mahdi Jamei and Emma M. Stewart and Sean Peisert and Anna Scaglione and Chuck McParland and Ciaran M. Roberts and Alex McEachern}, title = {Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Toward Critical Infrastructure Security}, journal = {{IEEE} Internet Comput.}, volume = {20}, number = {5}, pages = {18--27}, year = {2016}, url = {https://doi.org/10.1109/MIC.2016.102}, doi = {10.1109/MIC.2016.102}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/JameiSPSMRM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jamia/PeisertBDCGTBST16, author = {Sean Peisert and William Barnett and Eli Dart and James Cuff and Robert L. Grossman and Edward B. Talbot and Ari Berman and Anurag Shankar and Brian Tierney}, title = {The Medical Science {DMZ}}, journal = {J. Am. Medical Informatics Assoc.}, volume = {23}, number = {6}, pages = {1199--1201}, year = {2016}, url = {https://doi.org/10.1093/jamia/ocw032}, doi = {10.1093/JAMIA/OCW032}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jamia/PeisertBDCGTBST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JameiSRSPMM16, author = {Mahdi Jamei and Anna Scaglione and Ciaran M. Roberts and Emma M. Stewart and Sean Peisert and Chuck McParland and Alex McEachern}, title = {Automated Anomaly Detection in Distribution Grids Using {\(\mu\)}PMU Measurements}, journal = {CoRR}, volume = {abs/1610.01107}, year = {2016}, url = {http://arxiv.org/abs/1610.01107}, eprinttype = {arXiv}, eprint = {1610.01107}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JameiSRSPMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DuanPL15, author = {Sisi Duan and Sean Peisert and Karl N. Levitt}, title = {hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {1}, pages = {58--70}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2312331}, doi = {10.1109/TDSC.2014.2312331}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DuanPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KoutsandriaGJSP15, author = {Georgia Koutsandria and Reinhard Gentz and Mahdi Jamei and Anna Scaglione and Sean Peisert and Chuck McParland}, editor = {Indrajit Ray and Roshan K. Thomas and Alvaro A. C{\'{a}}rdenas}, title = {A Real-Time Testbed Environment for Cyber-Physical Security on the Power Grid}, booktitle = {Proceedings of the First {ACM} Workshop on Cyber-Physical Systems-Security and/or PrivaCy, {CPS-SPC} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {67--78}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808705.2808707}, doi = {10.1145/2808705.2808707}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KoutsandriaGJSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/ChavezSP15, author = {Adrian R. Chavez and William M. S. Stout and Sean Peisert}, title = {Techniques for the dynamic randomization of network attributes}, booktitle = {International Carnahan Conference on Security Technology, {ICCST} 2015, Taipei, Taiwan, September 21-24, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CCST.2015.7389661}, doi = {10.1109/CCST.2015.7389661}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/ChavezSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idcs/DuanSP15, author = {Sisi Duan and Jingtao Sun and Sean Peisert}, editor = {Giuseppe Di Fatta and Giancarlo Fortino and Wenfeng Li and Mukaddim Pathan and Frederic T. Stahl and Antonio Guerrieri}, title = {Towards a Self-Adaptive Middleware for Building Reliable Publish/Subscribe Systems}, booktitle = {Internet and Distributed Computing Systems - 8th International Conference, {IDCS} 2015, Windsor, UK, September 2-4, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9258}, pages = {157--168}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23237-9\_14}, doi = {10.1007/978-3-319-23237-9\_14}, timestamp = {Sat, 10 Sep 2022 20:50:33 +0200}, biburl = {https://dblp.org/rec/conf/idcs/DuanSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/NeumannPS14, author = {Peter G. Neumann and Sean Peisert and Marvin Schaefer}, title = {The {IEEE} Symposium on Security and Privacy, in Retrospect}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {15--17}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.59}, doi = {10.1109/MSP.2014.59}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/NeumannPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PeisertMNKS14, author = {Sean Peisert and Jonathan Margulies and David M. Nicol and Himanshu Khurana and Chris Sawall}, title = {Designed-in Security for Cyber-Physical Systems}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {9--12}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.90}, doi = {10.1109/MSP.2014.90}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PeisertMNKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PeisertM14, author = {Sean Peisert and Jonathan Margulies}, title = {Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction]}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {13--14}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.110}, doi = {10.1109/MSP.2014.110}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PeisertM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McParlandPS14, author = {Chuck McParland and Sean Peisert and Anna Scaglione}, title = {Monitoring Security of Networked Control Systems: It's the Physics}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {32--39}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.122}, doi = {10.1109/MSP.2014.122}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/McParlandPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PeisertMBDPT14, author = {Sean Peisert and Jonathan Margulies and Eric Byres and Paul Dorey and Dale Peterson and Zach Tudor}, title = {Control Systems Security from the Front Lines}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {55--58}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.112}, doi = {10.1109/MSP.2014.112}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PeisertMBDPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/debs/ChangDMPZ14, author = {Tiancheng Chang and Sisi Duan and Hein Meling and Sean Peisert and Haibin Zhang}, editor = {Umesh Bellur and Ravi Kothari}, title = {{P2S:} a fault-tolerant publish/subscribe infrastructure}, booktitle = {The 8th {ACM} International Conference on Distributed Event-Based Systems, {DEBS} '14, Mumbai, India, May 26-29, 2014}, pages = {189--197}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611286.2611305}, doi = {10.1145/2611286.2611305}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/debs/ChangDMPZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ParvaniaKMPMS14, author = {Masood Parvania and Georgia Koutsandria and Vishak Muthukumar and Sean Peisert and Chuck McParland and Anna Scaglione}, title = {Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems}, booktitle = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014}, pages = {774--779}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DSN.2014.81}, doi = {10.1109/DSN.2014.81}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/ParvaniaKMPMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/opodis/DuanMPZ14, author = {Sisi Duan and Hein Meling and Sean Peisert and Haibin Zhang}, editor = {Marcos K. Aguilera and Leonardo Querzoni and Marc Shapiro}, title = {BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration}, booktitle = {Principles of Distributed Systems - 18th International Conference, {OPODIS} 2014, Cortina d'Ampezzo, Italy, December 16-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8878}, pages = {91--106}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14472-6\_7}, doi = {10.1007/978-3-319-14472-6\_7}, timestamp = {Mon, 15 Jun 2020 17:10:01 +0200}, biburl = {https://dblp.org/rec/conf/opodis/DuanMPZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/KoutsandriaMPPMS14, author = {Georgia Koutsandria and Vishak Muthukumar and Masood Parvania and Sean Peisert and Chuck McParland and Anna Scaglione}, title = {A hybrid network {IDS} for protective digital relays in the power transmission grid}, booktitle = {2014 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2014, Venice, Italy, November 3-6, 2014}, pages = {908--913}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SmartGridComm.2014.7007764}, doi = {10.1109/SMARTGRIDCOMM.2014.7007764}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/KoutsandriaMPPMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BishopCPSACOP14, author = {Matt Bishop and Heather M. Conboy and Huong Phan and Borislava I. Simidchieva and George S. Avrunin and Lori A. Clarke and Leon J. Osterweil and Sean Peisert}, title = {Insider Threat Identification by Process Analysis}, booktitle = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA, USA, May 17-18, 2014}, pages = {251--264}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SPW.2014.40}, doi = {10.1109/SPW.2014.40}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BishopCPSACOP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/DuanLMPZ14, author = {Sisi Duan and Karl N. Levitt and Hein Meling and Sean Peisert and Haibin Zhang}, title = {ByzID: Byzantine Fault Tolerance from Intrusion Detection}, booktitle = {33rd {IEEE} International Symposium on Reliable Distributed Systems, {SRDS} 2014, Nara, Japan, October 6-9, 2014}, pages = {253--264}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SRDS.2014.28}, doi = {10.1109/SRDS.2014.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/DuanLMPZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/WhalenPB13, author = {Sean Whalen and Sean Peisert and Matt Bishop}, title = {Multiclass classification of distributed memory parallel computations}, journal = {Pattern Recognit. Lett.}, volume = {34}, number = {3}, pages = {322--329}, year = {2013}, url = {https://doi.org/10.1016/j.patrec.2012.10.007}, doi = {10.1016/J.PATREC.2012.10.007}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/prl/WhalenPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PeisertTK13, author = {Sean Peisert and Edward B. Talbot and Tom M. Kroeger}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Principles of authentication}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {47--56}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535819}, doi = {10.1145/2535813.2535819}, timestamp = {Sat, 11 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/PeisertTK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BishopP12, author = {Matt Bishop and Sean Peisert}, title = {Security and Elections}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {5}, pages = {64--67}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.127}, doi = {10.1109/MSP.2012.127}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BishopP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpca/WhalenEPB12, author = {Sean Whalen and Sophie Engle and Sean Peisert and Matt Bishop}, title = {Network-theoretic classification of parallel computation patterns}, journal = {Int. J. High Perform. Comput. Appl.}, volume = {26}, number = {2}, pages = {159--169}, year = {2012}, url = {https://doi.org/10.1177/1094342012436618}, doi = {10.1177/1094342012436618}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpca/WhalenEPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/WangLMSPM12, author = {Zhifang Wang and Xiao Li and Vishak Muthukumar and Anna Scaglione and Sean Peisert and Chuck McParland}, title = {Networked loads in the distribution grid}, booktitle = {Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} 2012, Hollywood, CA, USA, December 3-6, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6411875/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apsipa/WangLMSPM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PeisertTB12, author = {Sean Peisert and Edward B. Talbot and Matt Bishop}, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems}, booktitle = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, pages = {15--26}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413296.2413299}, doi = {10.1145/2413296.2413299}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/PeisertTB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2012cset, editor = {Sean Peisert and Stephen Schwab}, title = {5th Workshop on Cyber Security Experimentation and Test, {CSET} '12, Bellevue, WA, USA, August 6, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/cset12}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2012cset.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/Coles-KempGGPP12, author = {Lizzie Coles{-}Kemp and Carrie Gates and Dieter Gollmann and Sean Peisert and Christian W. Probst}, title = {Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501)}, journal = {Dagstuhl Reports}, volume = {2}, number = {12}, pages = {37--48}, year = {2012}, url = {https://doi.org/10.4230/DagRep.2.12.37}, doi = {10.4230/DAGREP.2.12.37}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/Coles-KempGGPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2011, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, publisher = {{ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2073276}, isbn = {978-1-4503-1078-9}, timestamp = {Tue, 13 Nov 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2011cset, editor = {Sean Peisert and Stephen Schwab}, title = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11, San Francisco, CA, USA, August 8, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/cset11}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2011cset.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BishopCPSBAFH10, author = {Matt Bishop and Justin Cummins and Sean Peisert and Anhad Singh and Bhume Bhumiratana and Deborah A. Agarwal and Deborah A. Frincke and Michael A. Hogarth}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {Relationships and data sanitization: a study in scarlet}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {151--164}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900567}, doi = {10.1145/1900546.1900567}, timestamp = {Mon, 28 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/BishopCPSBAFH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NeumannBPS10, author = {Peter G. Neumann and Matt Bishop and Sean Peisert and Marv Schaefer}, title = {Reflections on the 30th Anniversary of the {IEEE} Symposium on Security and Privacy}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {3--13}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.43}, doi = {10.1109/SP.2010.43}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/NeumannBPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SimidchievaECJPBCO10, author = {Borislava I. Simidchieva and Sophie Engle and Michael Clifford and Alicia Clay Jones and Sean Peisert and Matt Bishop and Lori A. Clarke and Leon J. Osterweil}, editor = {Douglas W. Jones and Jean{-}Jacques Quisquater and Eric Rescorla}, title = {Modeling and Analyzing Faults to Improve Election Process Robustness}, booktitle = {2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '10, Washington, D.C., USA, August 9-10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/evtwote-10/modeling-and-analyzing-faults-improve-election-process-robustness}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/SimidchievaECJPBCO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BishopEFGGPW10, author = {Matt Bishop and Sophie Engle and Deborah A. Frincke and Carrie Gates and Frank L. Greitzer and Sean Peisert and Sean Whalen}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {A Risk Management Approach to the "Insider Threat"}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {115--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_6}, doi = {10.1007/978-1-4419-7133-3\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BishopEFGGPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2010, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546}, doi = {10.1145/1900546}, isbn = {978-1-4503-0415-3}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/BishopEPWG09, author = {Matt Bishop and Sophie Engle and Sean Peisert and Sean Whalen and Carrie Gates}, title = {Case Studies of an Insider Framework}, booktitle = {42st Hawaii International International Conference on Systems Science {(HICSS-42} 2009), Proceedings {(CD-ROM} and online), 5-8 January 2009, Waikoloa, Big Island, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HICSS.2009.104}, doi = {10.1109/HICSS.2009.104}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/BishopEPWG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/PeisertBY09, author = {Sean Peisert and Matt Bishop and Alec Yasinsac}, title = {Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines}, booktitle = {42st Hawaii International International Conference on Systems Science {(HICSS-42} 2009), Proceedings {(CD-ROM} and online), 5-8 January 2009, Waikoloa, Big Island, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HICSS.2009.503}, doi = {10.1109/HICSS.2009.503}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/PeisertBY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PeisertBCG09, author = {Sean Peisert and Matt Bishop and Laura Corriss and Steven J. Greenwald}, editor = {Anil Somayaji and Richard Ford}, title = {Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet Juvenal}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {71--84}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719041}, doi = {10.1145/1719030.1719041}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/PeisertBCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/WestVLP09, author = {Jean West and Ulf Lindqvist and Peter J. Vasquez and Michael Losavio and Sean Peisert}, title = {Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure Security}, booktitle = {Fourth International {IEEE} Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2009, Berkeley, California, USA, May 21, 2009}, pages = {97--98}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SADFE.2009.11}, doi = {10.1109/SADFE.2009.11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sadfe/WestVLP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BishopPHG09, author = {Matt Bishop and Sean Peisert and Candice Hoke and Mark Graff}, editor = {David Jefferson and Joseph Lorenzo Hall and Tal Moran}, title = {E-Voting and Forensics: Prying Open the Black Box}, booktitle = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/evtwote-09/e-voting-and-forensics-prying-open-black-box}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/BishopPHG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BishopEPWG08, author = {Matt Bishop and Sophie Engle and Sean Peisert and Sean Whalen and Carrie Gates}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {We have met the enemy and he is us}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {1--12}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595678}, doi = {10.1145/1595676.1595678}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/BishopEPWG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/PeisertBM08, author = {Sean Peisert and Matt Bishop and Keith Marzullo}, title = {Computer Forensics in Forensis}, booktitle = {Third International Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2008, Berkeley, California, USA, May 22, 2008}, pages = {102--122}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SADFE.2008.18}, doi = {10.1109/SADFE.2008.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/PeisertBM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Peisert07, author = {Sean Peisert}, title = {A model of forensic analysis using goal-oriented logging}, school = {University of California, San Diego, {USA}}, year = {2007}, url = {http://www.escholarship.org/uc/item/4p5550kn}, timestamp = {Tue, 28 Mar 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Peisert07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PeisertB07, author = {Sean Peisert and Matt Bishop}, title = {I Am a Scientist, Not a Philosopher!}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {4}, pages = {48--51}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.84}, doi = {10.1109/MSP.2007.84}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PeisertB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PeisertBKM07, author = {Sean Peisert and Matt Bishop and Sidney Karin and Keith Marzullo}, title = {Analysis of Computer Intrusions Using Sequences of Function Calls}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {137--150}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1003}, doi = {10.1109/TDSC.2007.1003}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PeisertBKM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-8/PeisertB07, author = {Sean Peisert and Matt Bishop}, editor = {Lynn Futcher and Ronald Dodge}, title = {How to Design Computer Security Experiments}, booktitle = {Fifth World Conference on Information Security Education, Proceedings of the {IFIP} {TC11} {WG} 11.8, {WISE} 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, {USA}}, series = {{IFIP}}, volume = {237}, pages = {141--148}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73269-5\_19}, doi = {10.1007/978-0-387-73269-5\_19}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-8/PeisertB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/PeisertBKM07, author = {Sean Peisert and Matt Bishop and Sidney Karin and Keith Marzullo}, editor = {Ming{-}Yuh Huang and Deborah A. Frincke}, title = {Toward Models for Forensic Analysis}, booktitle = {Second International Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2007, Seattle, Washington, USA, April 10-12, 2007}, pages = {3--15}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SADFE.2007.23}, doi = {10.1109/SADFE.2007.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/PeisertBKM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Peisert05, author = {Sean Peisert}, title = {Forensics for System Administrators}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/forensics-system-administrators}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Peisert05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PeisertKBM05, author = {Sean Peisert and Sidney Karin and Matt Bishop and Keith Marzullo}, editor = {Simon N. Foley}, title = {Principles-driven forensic analysis}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {85--93}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146291}, doi = {10.1145/1146269.1146291}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/PeisertKBM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.