Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 3 Similar Profiles
Advanced metering infrastructures Engineering & Materials Science
Fault tolerance Engineering & Materials Science
Dependability Mathematics
Petri nets Engineering & Materials Science
Reward Mathematics
Costs Engineering & Materials Science
Security systems Engineering & Materials Science
Network protocols Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1985 2018

Evaluating Detectors on Optimal Attack Vectors that enable Electricity Theft and DER Fraud

Badrinath Krishna, V., Gunter, C. & Sanders, W. H. May 4 2018 (Accepted/In press) In : IEEE Journal on Selected Topics in Signal Processing.

Research output: Contribution to journalArticle

Energy resources
Electricity
Detectors
Advanced metering infrastructures
Smart meters

Poster: Detecting monitor compromise using evidential reasoning

Thakore, U., Fawaz, A. & Sanders, W. H. Apr 10 2018 Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2018. Association for Computing Machinery, 3191693

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A case study assessing the effects of cyber attacks on a river zonal dispatcher

Wright, R. J., Keefe, K., Feddersen, B. & Sanders, W. H. Jan 1 2017 Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers. Springer Verlag, Vol. 10242 LNCS, p. 252-264 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10242 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rivers
Attack
Intrusion detection
Security systems
Catchments

Accounting for the human user in predictive security models

Noureddine, M. A., Marturano, A., Keefe, K., Bashiry, M. & Sanders, W. H. May 5 2017 Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. IEEE Computer Society, p. 329-338 10 p. 7920638

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social sciences
Security systems
Uncertainty

An unsupervised multi-detector approach for identifying malicious lateral movement

Bohara, A., Noureddine, M. A., Fawaz, A. & Sanders, W. H. Oct 13 2017 Proceedings - 2017 IEEE 36th International Symposium on Reliable Distributed Systems, SRDS 2017. IEEE Computer Society, Vol. 2017-September, p. 224-233 10 p. 8069085

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Graphic methods
Command and Control
Network Security
Network security
Anomaly Detection