William H Sanders

Interim Director, Discovery Partners Institute

1985 …2019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 4 Similar Profiles
Advanced metering infrastructures Engineering & Materials Science
Dependability Mathematics
Reward Mathematics
Fault tolerance Engineering & Materials Science
Security systems Engineering & Materials Science
Costs Engineering & Materials Science
Petri nets Engineering & Materials Science
Network protocols Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1985 2019

Data-driven model-based detection of malicious insiders via physical access logs

Cheh, C., Thakore, U., Fawaz, A., Chen, B., Temple, W. G. & Sanders, W. H., Nov 2019, In : ACM Transactions on Modeling and Computer Simulation. 29, 4, 26.

Research output: Contribution to journalArticle

Data-driven
Model-based
Access control
Control systems
Access Control

Data protection intents for software-defined networking

Ujcich, B. E. & Sanders, W. H., Jun 2019, Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019. Jacquenet, C., De Turck, F., Chemouil, P., Esposito, F., Festor, O., Cerroni, W. & Secci, S. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 271-275 5 p. 8806684. (Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Software defined networking
Industry
Controllers

Determining tolerable attack surfaces that preserves safety of cyber-physical systems

Cheh, C., Fawaz, A., Noureddine, M. A., Chen, B., Temple, W. G. & Sanders, W. H., Feb 11 2019, Proceedings - 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing, PRDC 2018. IEEE Computer Society, p. 125-134 10 p. 8639695. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC; vol. 2018-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Network protocols
Cyber Physical System

Leveraging physical access logs to identify tailgating: Limitations and solutions

Cheh, C., Thakore, U., Chen, B., Temple, W. G. & Sanders, W. H., Sep 2019, Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019. Institute of Electrical and Electronics Engineers Inc., p. 127-132 6 p. 8893375. (Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Critical infrastructures
taps
cards
Railway
stations

Modeling adversarial physical movement in a railway station: Classification and metrics

Cheh, C., Chen, B., Temple, W. G. & Sanders, W. H., Oct 2019, In : ACM Transactions on Cyber-Physical Systems. 4, 1, A11.

Research output: Contribution to journalArticle

Physical Modeling
Intrusion detection
Railway
Metric
Intrusion Detection