
William H. Sanders
Person information
- affiliation: University of Illinois, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j57]Carmen Cheh, Binbin Chen, William G. Temple, William H. Sanders:
Modeling Adversarial Physical Movement in a Railway Station: Classification and Metrics. ACM Trans. Cyber Phys. Syst. 4(1): 11:1-11:25 (2020) - [c184]Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Steven R. Gomez, Adam Bates, William H. Sanders, Hamed Okhravi:
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking. NDSS 2020 - [c183]Benjamin E. Ujcich, Adam Bates, William H. Sanders:
Provenance for Intent-Based Networking. NetSoft 2020: 195-199 - [c182]Michael J. Rausch, William H. Sanders:
Sensitivity Analysis and Uncertainty Quantification of State-Based Discrete-Event Simulation Models Through a Stacked Ensemble of Metamodels. QEST 2020: 276-293 - [c181]Atul Bohara, Jordi Ros-Giralt, Ghada Elbez, Alfonso Valdes, Klara Nahrstedt, William H. Sanders:
ED4GAP: Efficient Detection for GOOSE-Based Poisoning Attacks on IEC 61850 Substations. SmartGridComm 2020: 1-7 - [c180]Michael J. Rausch, William H. Sanders:
Stacked Metamodels for Sensitivity Analysis and Uncertainty Quantification of AMI Models. SmartGridComm 2020: 1-7
2010 – 2019
- 2019
- [j56]Carmen Cheh, Uttam Thakore, Ahmed M. Fawaz, Binbin Chen, William G. Temple, William H. Sanders:
Data-driven Model-based Detection of Malicious Insiders via Physical Access Logs. ACM Trans. Model. Comput. Simul. 29(4): 26:1-26:25 (2019) - [c179]Mohammad A. Noureddine, Amanda Hsu, Matthew Caesar, Fadi A. Zaraket, William H. Sanders:
P4AIG: Circuit-Level Verification of P4 Programs. DSN (Supplements) 2019: 21-22 - [c178]Mohammad A. Noureddine, Ahmed M. Fawaz, Amanda Hsu, Cody Guldner, Sameer Vijay, Tamer Basar, William H. Sanders:
Revisiting Client Puzzles for State Exhaustion Attacks Resilience. DSN 2019: 617-629 - [c177]Carmen Cheh, Uttam Thakore, Binbin Chen, William G. Temple, William H. Sanders:
Leveraging Physical Access Logs to Identify Tailgating: Limitations and Solutions. EDCC 2019: 127-132 - [c176]Uttam Thakore, Harigovind V. Ramasamy, William H. Sanders:
Coordinated Analysis of Heterogeneous Monitor Data in Enterprise Clouds for Incident Response. ISSRE Workshops 2019: 53-58 - [c175]Benjamin E. Ujcich, William H. Sanders:
Data Protection Intents for Software-Defined Networking. NetSoft 2019: 271-275 - 2018
- [j55]Varun Badrinath Krishna, Ziping Wu, Vaidehi V. Ambardekar, Richard Macwan, William H. Sanders:
Cyberattacks on Primary Frequency Response Mechanisms in Power Grids. Computer 51(11): 37-45 (2018) - [j54]Varun Badrinath Krishna
, Carl A. Gunter, William H. Sanders:
Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud. IEEE J. Sel. Top. Signal Process. 12(4): 790-805 (2018) - [c174]Benjamin E. Ujcich, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi:
Cross-App Poisoning in Software-Defined Networking. CCS 2018: 648-663 - [c173]Ahmed M. Fawaz, Mohammad A. Noureddine, William H. Sanders:
POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy. DSN 2018: 514-525 - [c172]Giulio Masetti, Silvano Chiaradonna, Felicita Di Giandomenico, Brett Feddersen, William H. Sanders:
An Efficient Strategy for Model Composition in the Möbius Modeling Environment. EDCC 2018: 116-119 - [c171]Ken Keefe, Brett Feddersen, Michael J. Rausch, Ronald Joseph Wright, William H. Sanders:
An Ontology Framework for Generating Discrete-Event Stochastic Models. EPEW 2018: 173-189 - [c170]Uttam Thakore, Ahmed M. Fawaz, William H. Sanders:
Detecting monitor compromise using evidential reasoning: poster. HotSoS 2018: 16:1 - [c169]Benjamin E. Ujcich, Adam Bates, William H. Sanders:
A Provenance Model for the European Union General Data Protection Regulation. IPAW 2018: 45-57 - [c168]Carmen Cheh, Ahmed M. Fawaz, Mohammad A. Noureddine, Binbin Chen, William G. Temple, William H. Sanders:
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems. PRDC 2018: 125-134 - [c167]Michael J. Rausch, Ahmed M. Fawaz, Ken Keefe, William H. Sanders:
Modeling Humans: A General Agent Model for the Evaluation of Security. QEST 2018: 373-388 - [c166]Michael J. Rausch, Varun Badrinath Krishna, Peng Gu, Rupak Chandra, Brett Feddersen, Ahmed M. Fawaz, William H. Sanders:
Peer-to-peer Detection of DoS Attacks on City-Scale IoT Mesh Networks. SmartGridComm 2018: 1-6 - [i4]Mohammad A. Noureddine, Ahmed M. Fawaz, Tamer Basar, William H. Sanders:
Revisiting Client Puzzles for State Exhaustion Attacks Resilience. CoRR abs/1807.11892 (2018) - 2017
- [c165]Carmen Cheh, Ken Keefe, Brett Feddersen, Binbin Chen, William G. Temple, William H. Sanders:
Developing Models for Physical Attacks in Cyber-Physical Systems. CPS-SPC@CCS 2017: 49-55 - [c164]Michael J. Rausch, Ken Keefe, Brett Feddersen, William H. Sanders:
Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options. CRITIS 2017: 156-167 - [c163]Varun Badrinath Krishna, Michael J. Rausch, Benjamin E. Ujcich, Indranil Gupta, William H. Sanders:
REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks. DSN 2017: 321-332 - [c162]Benjamin E. Ujcich, Uttam Thakore, William H. Sanders:
ATTAIN: An Attack Injection Framework for Software-Defined Networking. DSN 2017: 567-578 - [c161]Ahmed M. Fawaz, William H. Sanders:
Learning Process Behavioral Baselines for Anomaly Detection. PRDC 2017: 145-154 - [c160]William G. Temple, Bao Anh N. Tran, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders:
On Train Automatic Stop Control Using Balises: Attacks and a Software-Only Countermeasure. PRDC 2017: 274-283 - [c159]Mohammad A. Noureddine, Andrew Marturano, Ken Keefe, Masooda Bashir, William H. Sanders:
Accounting for the Human User in Predictive Security Models. PRDC 2017: 329-338 - [c158]Carmen Cheh, Binbin Chen, William G. Temple, William H. Sanders:
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs. QEST 2017: 275-291 - [c157]Atul Bohara, Mohammad A. Noureddine, Ahmed M. Fawaz, William H. Sanders:
An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement. SRDS 2017: 224-233 - [i3]Ahmed M. Fawaz, Mohammad A. Noureddine, William H. Sanders:
PowerAlert: An Integrity Checker using Power Measurement. CoRR abs/1702.02907 (2017) - 2016
- [j53]Ken Keefe, William H. Sanders:
Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool. EAI Endorsed Trans. Security Safety 3(10): e3 (2016) - [j52]Ahmed M. Fawaz, Robin Berthier, William H. Sanders:
A Response Cost Model for Advanced Metering Infrastructures. IEEE Trans. Smart Grid 7(2): 543-553 (2016) - [c156]Ronald Joseph Wright, Ken Keefe, Brett Feddersen, William H. Sanders:
A Case Study Assessing the Effects of Cyber Attacks on a River Zonal Dispatcher. CRITIS 2016: 252-264 - [c155]Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer
, David M. Nicol:
The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment. GraMSec@CSF 2016: 39-61 - [c154]Uttam Thakore, Gabriel A. Weaver, William H. Sanders:
A Quantitative Methodology for Security Monitor Deployment. DSN 2016: 1-12 - [c153]Varun Badrinath Krishna, Kiryung Lee, Gabriel A. Weaver, Ravishankar K. Iyer, William H. Sanders:
F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids. DSN 2016: 407-418 - [c152]Mohammad A. Noureddine, Ahmed M. Fawaz, William H. Sanders, Tamer Basar:
A Game-Theoretic Approach to Respond to Attacker Lateral Movement. GameSec 2016: 294-313 - [c151]Atul Bohara, Uttam Thakore, William H. Sanders:
Intrusion detection in enterprise systems by combining and clustering diverse monitor data. HotSoS 2016: 7-16 - [c150]Michael J. Rausch, Brett Feddersen, Ken Keefe, William H. Sanders:
A Comparison of Different Intrusion Detection Approaches in an Advanced Metering Infrastructure Network Using ADVISE. QEST 2016: 279-294 - [c149]Ahmed M. Fawaz, Atul Bohara, Carmen Cheh, William H. Sanders:
Lateral Movement Detection Using Distributed Data Fusion. SRDS 2016: 21-30 - 2015
- [j51]Saman A. Zonouz, Robin Berthier, Himanshu Khurana, William H. Sanders, Tim Yardley:
Seclius: An Information Flow-Based, Consequence-Centric Security Metric. IEEE Trans. Parallel Distributed Syst. 26(2): 562-573 (2015) - [c148]Varun Badrinath Krishna, Ravishankar K. Iyer, William H. Sanders:
ARIMA-Based Modeling and Validation of Consumption Readings in Power Grids. CRITIS 2015: 199-210 - [c147]Mohammad A. Noureddine, Ken Keefe, William H. Sanders, Masooda Bashir:
Quantitative security metrics with human in the loop. HotSoS 2015: 21:1-21:2 - [c146]Carmen Cheh, Gabriel A. Weaver, William H. Sanders:
Cyber-Physical Topology Language: Definition, Operations, and Application. PRDC 2015: 60-69 - [c145]Sumeet Jauhar, Binbin Chen, William G. Temple, Xinshu Dong, Zbigniew T. Kalbarczyk, William H. Sanders, David M. Nicol:
Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios. PRDC 2015: 319-324 - [c144]Varun Badrinath Krishna, Gabriel A. Weaver, William H. Sanders:
PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure. QEST 2015: 70-85 - [c143]Binbin Chen, Christoph Schmittner, Zhendong Ma, William G. Temple, Xinshu Dong, Douglas L. Jones, William H. Sanders:
Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective. SAFECOMP Workshops 2015: 277-290 - 2014
- [j50]William H. Sanders:
Quantitative Security Metrics: Unattainable Holy Grail or a Vital Breakthrough within Our Reach? IEEE Secur. Priv. 12(2): 67-69 (2014) - [j49]Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley:
RRE: A Game-Theoretic Intrusion Response and Recovery Engine. IEEE Trans. Parallel Distributed Syst. 25(2): 395-406 (2014) - [j48]Saman A. Zonouz, Charles M. Davis, Katherine R. Davis
, Robin Berthier, Rakesh B. Bobba, William H. Sanders:
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures. IEEE Trans. Smart Grid 5(1): 3-13 (2014) - [j47]Alvaro A. Cárdenas, Robin Berthier, Rakesh B. Bobba, Jun Ho Huh, Jorjeta G. Jetcheva, David Grochocki, William H. Sanders:
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures. IEEE Trans. Smart Grid 5(2): 906-915 (2014) - [c142]Alefiya Hussain, Ted Faber, Robert Braden, Terry V. Benzel, Tim Yardley, Jeremy Jones, David M. Nicol, William H. Sanders, Thomas W. Edgar, Thomas E. Carroll, David O. Manz
, Laura Tinnel:
Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems. DCOSS 2014: 358-360 - [c141]Nils Ole Tippenhauer
, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders:
Automatic Generation of Security Argument Graphs. PRDC 2014: 33-42 - [e3]Gethin Norman, William H. Sanders:
Quantitative Evaluation of Systems - 11th International Conference, QEST 2014, Florence, Italy, September 8-10, 2014. Proceedings. Lecture Notes in Computer Science 8657, Springer 2014, ISBN 978-3-319-10695-3 [contents] - [i2]Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders:
Automatic Generation of Security Argument Graphs. CoRR abs/1405.7475 (2014) - [i1]Erika Ábrahám, Alberto Avritzer, Anne Remke, William H. Sanders:
Randomized Timed and Hybrid Models for Critical Infrastructures (Dagstuhl Seminar 14031). Dagstuhl Reports 4(1): 36-82 (2014) - 2013
- [j46]Saman A. Zonouz, Amir Houmansadr, Robin Berthier, Nikita Borisov, William H. Sanders:
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Comput. Secur. 37: 215-227 (2013) - [c140]Gabriel A. Weaver, Carmen Cheh, Edmond Rogers, William H. Sanders, Dennis Gammel:
Toward a cyber-physical topology language: applications to NERC CIP audit. SEGS@CCS 2013: 93-104 - [c139]Michael D. Ford, Ken Keefe, Elizabeth LeMay, William H. Sanders, Carol Muehrcke:
Implementing the ADVISE security modeling formalism in Möbius. DSN 2013: 1-8 - [c138]Sobir Bazarbayev, Matti A. Hiltunen, Kaustubh R. Joshi, William H. Sanders, Richard D. Schlichting:
PSCloud: a durable context-aware personal storage cloud. HotDep 2013: 9:1-9:6 - [c137]Sobir Bazarbayev, Matti A. Hiltunen, Kaustubh R. Joshi, William H. Sanders, Richard D. Schlichting:
Content-Based Scheduling of Virtual Machines (VMs) in the Cloud. ICDCS 2013: 93-101 - [c136]Timothy M. Yardley, Robin Berthier, David M. Nicol, William H. Sanders:
Smart grid protocol testing through cyber-physical testbeds. ISGT 2013: 1-6 - [c135]Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer
, An Hoa Vu, David K. Y. Yau:
Go with the flow: toward workflow-oriented security assessment. NSPW 2013: 65-76 - [c134]Ken Keefe, William H. Sanders:
Möbius Shell: A Command-Line Interface for Möbius. QEST 2013: 282-285 - [c133]William Niemira, Rakesh B. Bobba, Peter W. Sauer, William H. Sanders:
Malicious data detection in state estimation leveraging system losses & estimation of perturbed parameters. SmartGridComm 2013: 402-407 - [c132]Robin Berthier, Jorjeta G. Jetcheva, Daisuke Mashima, Jun Ho Huh, David Grochocki, Rakesh B. Bobba, Alvaro A. Cárdenas, William H. Sanders:
Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures. SmartGridComm 2013: 450-455 - [c131]Muhammad Salman Malik, Robin Berthier, Rakesh B. Bobba, Roy H. Campbell, William H. Sanders:
Formal design of communication checkers for ICCP using UPPAAL. SmartGridComm 2013: 486-491 - [c130]Uttam Thakore, Gabriel A. Weaver, William H. Sanders:
An Actor-centric, Asset-Based Monitor Deployment Model for Cloud Computing. UCC 2013: 311-312 - 2012
- [j45]Saman A. Zonouz, Katherine M. Rogers, Robin Berthier, Rakeshbabu Bobba, William H. Sanders, Thomas J. Overbye
:
SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures. IEEE Trans. Smart Grid 3(4): 1790-1799 (2012) - [c129]Eric Rozier, William H. Sanders:
A framework for efficient evaluation of the fault tolerance of deduplicated storage systems. DSN 2012: 1-12 - [c128]Jing Zhang, Robin Berthier, Will Rhee, Michael Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Safeguarding academic accounts and resources with the University Credential Abuse Auditing System. DSN 2012: 1-8 - [c127]Ryan M. Lefever, Vikram S. Adve, William H. Sanders:
A Mirrored Data Structures Approach to Diverse Partial Memory Replication. EDCC 2012: 61-72 - [c126]William H. Sanders:
Building resilient infrastructures for smart energy systems (abstract). ISGT 2012: 1 - [c125]William H. Sanders:
TCIPG: Trustworthy cyber infrastructure for the power grid overview. ISGT 2012: 1-2 - [c124]William H. Sanders:
Assuring the trustworthiness of the smarter electric grid. NCA 2012 - [c123]Michael D. Ford, Peter Buchholz
, William H. Sanders:
State-Based Analysis in ADVISE. QEST 2012: 148-157 - [c122]Ahmed M. Fawaz, Robin Berthier, William H. Sanders:
Cost modeling of response actions for automated response and recovery in AMI. SmartGridComm 2012: 348-353 - [c121]David Grochocki, Jun Ho Huh, Robin Berthier, Rakesh Bobba, William H. Sanders, Alvaro A. Cárdenas, Jorjeta G. Jetcheva:
AMI threats, intrusion detection requirements and deployment recommendations. SmartGridComm 2012: 395-400 - [c120]Jing Zhang, Robin Berthier, Will Rhee, Michael Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Learning from Early Attempts to Measure Information Security Performance. CSET 2012 - [c119]William H. Sanders:
Assuring the trustworthiness of the smarter electric grid. ICPE 2012: 19-20 - 2011
- [j44]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders:
Using CPU gradients for performance-aware energy conservation in multitier systems. Sustain. Comput. Informatics Syst. 1(2): 113-133 (2011) - [j43]Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, Richard D. Schlichting:
Probabilistic Model-Driven Recovery in Distributed Systems. IEEE Trans. Dependable Secur. Comput. 8(6): 913-928 (2011) - [j42]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders:
Using link gradients to predict the impact of network latency on multitier applications. IEEE/ACM Trans. Netw. 19(3): 855-868 (2011) - [c118]Saman A. Zonouz, Aashish Sharma, HariGovind V. Ramasamy, Zbigniew T. Kalbarczyk, Birgit Pfitzmann, Kevin P. McAuliffe, Ravishankar K. Iyer, William H. Sanders, Eric Cope:
Managing business health in the presence of malicious attacks. DSN Workshops 2011: 9-14 - [c117]Robin Berthier, William H. Sanders:
Specification-Based Intrusion Detection for Advanced Metering Infrastructures. PRDC 2011: 184-193 - [c116]Elizabeth LeMay, Michael D. Ford, Ken Keefe, William H. Sanders, Carol Muehrcke:
Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE). QEST 2011: 191-200 - [c115]Douglas Eskins, William H. Sanders:
The Multiple-Asymmetric-Utility System Model: A Framework for Modeling Cyber-Human Systems. QEST 2011: 233-242 - [c114]Saman A. Zonouz, Kaustubh R. Joshi, William H. Sanders:
FloGuard: Cost-Aware Systemwide Intrusion Defense via Online Forensics and On-Demand IDS Deployment. SAFECOMP 2011: 338-354 - [c113]Eric Rozier, William H. Sanders, Pin Zhou, NagaPramod Mandagere, Sandeep Uttamchandani, Mark L. Yakushev:
Modeling the Fault Tolerance Consequences of Deduplication. SRDS 2011: 75-84 - 2010
- [j41]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders:
Blackbox prediction of the impact of DVFS on end-to-end performance of multitier systems. SIGMETRICS Perform. Evaluation Rev. 37(4): 59-63 (2010) - [j40]Shravan Gaonkar, Kimberly Keeton
, Arif Merchant, William H. Sanders:
Designing Dependable Storage Solutions for Shared Application Environments. IEEE Trans. Dependable Secur. Comput. 7(4): 366-380 (2010) - [c112]Ryan M. Lefever, Vikram S. Adve, William H. Sanders:
Diverse Partial Memory Replication. DSN 2010: 71-80 - [c111]Ann T. Tai, Kam S. Tso, William H. Sanders:
Diversity-inspired clustering for self-healing MANETs: Motivation, protocol, and performability evaluation. DSN 2010: 547-556 - [c110]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders:
CPU gradients: Performance-aware energy conservation in multitier systems. Green Computing Conference 2010: 15-29 - [c109]David M. Nicol, William H. Sanders, Mouna Seri, Sankalp Singh:
Experiences Validating the Access Policy Tool in Industrial Settings. HICSS 2010: 1-8 - [c108]William H. Sanders:
Quantitative Evaluation of Security Metrics. QEST 2010: 306 - [c107]Saman A. Zonouz, Kaustubh R. Joshi, William H. Sanders:
Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment. SafeConfig 2010: 71-74
2000 – 2009
- 2009
- [j39]Shravan Gaonkar, Ken Keefe, Ruth Lamprecht, Eric Rozier, Peter Kemper, William H. Sanders:
Performance and dependability modeling with Möbius. SIGMETRICS Perform. Evaluation Rev. 36(4): 16-21 (2009) - [c106]Tod Courtney, Shravan Gaonkar, Ken Keefe, Eric Rozier, William H. Sanders:
Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models. DSN 2009: 353-358 - [c105]Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley:
RRE: A game-theoretic intrusion Response and Recovery Engine. DSN 2009: 439-448 - [c104]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, Richard D. Schlichting:
Link Gradients: Predicting the Impact of Network Latency on Multitier Applications. INFOCOM 2009: 2258-2266 - [c103]Ken Keefe, Quincy Mitchell, Eric Rozier, William H. Sanders:
Remote Job Management in the Mobius Modeling Framework. QEST 2009: 209-210 - [c102]Shravan Gaonkar, William H. Sanders:
G-SSASC: Simultaneous Simulation of System Models with bounded Hazard Rates. Winter Simulation Conference 2009: 663-673 - 2008
- [j38]David M. Nicol, William H. Sanders, Sankalp Singh, Mouna Seri:
Usable Global Network Access Policy for Process Control Systems. IEEE Secur. Priv. 6(6): 30-36 (2008) - [j37]HariGovind V. Ramasamy, Prashant Pandey, Michel Cukier, William H. Sanders:
Experiences with building an intrusion-tolerant group communication system. Softw. Pract. Exp. 38(6): 639-666 (2008) - [c101]Shravan Gaonkar, Eric Rozier, Anthony Tong, William H. Sanders:
Scaling file systems to support petascale clusters: A dependability analysis to support informed design choices. DSN 2008: 386-391 - [c100]Ann T. Tai, Kam S. Tso, William H. Sanders:
A recurrence-relation-based reward model for performability evaluation of embedded systems. DSN 2008: 532-541 - [c99]Saman A. Zonouz, William H. Sanders:
A Kalman-Based Coordination for Hierarchical State Estimation: Agorithm and Analysis. HICSS 2008: 187 - [c98]Elizabeth Van Ruitenbeek, William H. Sanders:
Modeling Peer-to-Peer Botnets. QEST 2008: 307-316 - 2007
- [j36]Jean Peccoud
, Tod Courtney, William H. Sanders:
Möbius: an integrated discrete-event modeling environment. Bioinform. 23(24): 3412-3414 (2007) - [j35]HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders:
A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution. IEEE Trans. Dependable Secur. Comput. 4(1): 1-17 (2007) - [j34]W. Douglas Obal II, Michael G. McQuinn, William H. Sanders:
Detecting and Exploiting Symmetry in Discrete-State Markov Models. IEEE Trans. Reliab. 56(4): 643-654 (2007) - [c97]Elizabeth Van Ruitenbeek, Tod Courtney, William H. Sanders, Fabrice Stevens:
Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms. DSN 2007: 790-800 - [c96]Robert K. Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich:
Securing Current and Future Process Control Systems. Critical Infrastructure Protection 2007: 99-115 - [c95]HariGovind V. Ramasamy, Mouna Seri, William H. Sanders:
The coBFIT toolkit. PODC 2007: 350-351 - [c94]Michael G. McQuinn, Peter Kemper, William H. Sanders:
Dependability Analysis with Markov Chains: How Symmetries Improve Symbolic Computations. QEST 2007: 151-160 - [c93]Tod Courtney, Shravan Gaonkar, Michael G. McQuinn, Eric Rozier, William H. Sanders, Patrick G. Webster:
Design of Experiments within the Mobius Modeling Environment. QEST 2007: 161-162 - [c92]David M. Nicol, Steve Hanna, Frank Stratton, William H. Sanders:
Modeling and analysis of worm defense using stochastic activity networks. SpringSim (3) 2007: 349-355 - 2006
- [j33]