William H Sanders

Interim Director, Discovery Partners Institute

1985 …2019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1985 2019

2019

Data protection intents for software-defined networking

Ujcich, B. E. & Sanders, W. H., Jun 2019, Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019. Jacquenet, C., De Turck, F., Chemouil, P., Esposito, F., Festor, O., Cerroni, W. & Secci, S. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 271-275 5 p. 8806684. (Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Software defined networking
Industry
Controllers

Determining tolerable attack surfaces that preserves safety of cyber-physical systems

Cheh, C., Fawaz, A., Noureddine, M. A., Chen, B., Temple, W. G. & Sanders, W. H., Feb 11 2019, Proceedings - 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing, PRDC 2018. IEEE Computer Society, p. 125-134 10 p. 8639695. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC; vol. 2018-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Network protocols
Cyber Physical System

Modeling adversarial physical movement in a railway station: Classification and metrics

Cheh, C., Chen, B., Temple, W. G. & Sanders, W. H., Oct 2019, In : ACM Transactions on Cyber-Physical Systems. 4, 1, A11.

Research output: Contribution to journalArticle

Physical Modeling
Intrusion detection
Railway
Metric
Intrusion Detection

P4AIG: Circuit-Level Verification of P4 Programs

Noureddine, M. A., Hsu, A., Caesar, M. C., Zaraket, F. A. & Sanders, W. H., Jun 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019. Institute of Electrical and Electronics Engineers Inc., p. 21-22 2 p. 8805757. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Networks (circuits)
Sequential circuits
Electric network analysis
Scalability
Pipelines

Revisiting Client Puzzles for State Exhaustion Attacks Resilience

Noureddine, M. A., Fawaz, A. M., Hsu, A., Guldner, C., Vijay, S., Basar, M. T. & Sanders, W. H., Jun 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019. Institute of Electrical and Electronics Engineers Inc., p. 617-629 13 p. 8809536. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Testbeds
Servers
Experiments
Linux
2018

An Efficient Strategy for Model Composition in the Möbius Modeling Environment

Masetti, G., Chiaradonna, S., Di Giandomenico, F., Feddersen, B. & Sanders, W. H., Nov 9 2018, Proceedings - 2018 14th European Dependable Computing Conference, EDCC 2018. Institute of Electrical and Electronics Engineers Inc., p. 116-119 4 p. 8530770

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chemical analysis
Modeling
Dependability
Data Flow
Infrastructure

An Ontology Framework for Generating Discrete-Event Stochastic Models

Keefe, K., Feddersen, B., Rausch, M., Wright, R. & Sanders, W. H., Jan 1 2018, Computer Performance Engineering - 15th European Workshop, EPEW 2018, Proceedings. Remke, A., Ballarini, P., Barbot, B., Bakhshi, R. & Castel-Taleb, H. (eds.). Springer-Verlag, p. 173-189 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11178 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discrete Event
Stochastic models
Stochastic Model
Ontology
Model

A provenance model for the european union general data protection regulation

Ujcich, B. E., Bates, A. & Sanders, W. H., Jan 1 2018, Provenance and Annotation of Data and Processes - 7th International Provenance and Annotation Workshop, IPAW 2018, Proceedings. Belhajjame, K., Gehani, A. & Alper, P. (eds.). Springer-Verlag, p. 45-57 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11017 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Provenance
Union
Model
Compliance

Automatically generating security models from system models to aid in the evaluation of AMI deployment options

Rausch, M., Keefe, K., Feddersen, B. & Sanders, W. H., Jan 1 2018, Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers. D’Agostino, G. & Scala, A. (eds.). Springer-Verlag, p. 156-167 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10707 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Advanced metering infrastructures
Security Model
Infrastructure
Evaluation
Ontology

Cross-app poisoning in software-defined networking

Ujcich, B. E., Jero, S., Edmundson, A., Wang, Q., Skowyra, R., Landry, J., Bates, A. M., Sanders, W. H., Nita-Rotaru, C. & Okhravi, H., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 648-663 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
Application programs
Flow control
Access control
Controllers

Cyberattacks on primary frequency response mechanisms in power grids

Badrinath Krishna, V., Wu, Z., Ambardekar, V. V., Macwan, R. & Sanders, W. H., Nov 2018, Computer, 51, 11, p. 37-45 9 p.

Research output: Contribution to specialist publicationArticle

Outages
Frequency response
Control systems

Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and der Fraud

Krishna, V. B., Gunter, C. & Sanders, W. H., Aug 2018, In : IEEE Journal on Selected Topics in Signal Processing. 12, 4, p. 790-805 16 p., 8355252.

Research output: Contribution to journalArticle

Electricity
Detectors
Energy resources
Advanced metering infrastructures
Smart meters

Modeling humans: A general agent model for the evaluation of security

Rausch, M., Fawaz, A., Keefe, K. & Sanders, W. H., Jan 1 2018, Quantitative Evaluation of Systems - 15th International Conference, QEST 2018, Proceedings. Horvath, A. & McIver, A. (eds.). Springer-Verlag, p. 373-388 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11024 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Evaluation
Modeling
Planning
Security Model
User Behavior

Peer-to-peer Detection of DoS Attacks on City-Scale IoT Mesh Networks

Rausch, M. J., Krishna, V. B., Gu, P., Chandra, R., Feddersen, B., Fawaz, A. & Sanders, W. H., Dec 24 2018, 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018. Institute of Electrical and Electronics Engineers Inc., 8587518. (2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer networks
Topology
Smart meters
Monitoring
Communication

Poster: Detecting monitor compromise using evidential reasoning

Thakore, U., Fawaz, A. & Sanders, W. H., Apr 10 2018, Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2018. Association for Computing Machinery, 3191693. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

POWERALERT: Integrity checking using power measurement and a Game-Theoretic strategy

Fawaz, A. M., Noureddine, M. A. & Sanders, W. H., Jul 19 2018, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018. Institute of Electrical and Electronics Engineers Inc., p. 514-525 12 p. 8416511. (Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
2017

A case study assessing the effects of cyber attacks on a river zonal dispatcher

Wright, R. J., Keefe, K., Feddersen, B. & Sanders, W. H., Jan 1 2017, Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers. Setola, R., Wolthusen, S., Nassopoulos, H., Havarneanu, G. & Wolthusen, S. (eds.). Springer-Verlag, p. 252-264 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10242 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rivers
Attack
Intrusion detection
Security systems
Catchments

Accounting for the human user in predictive security models

Noureddine, M. A., Marturano, A., Keefe, K., Bashiry, M. & Sanders, W. H., May 5 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (eds.). IEEE Computer Society, p. 329-338 10 p. 7920638. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social sciences
Security systems
Uncertainty

An unsupervised multi-detector approach for identifying malicious lateral movement

Bohara, A., Noureddine, M. A., Fawaz, A. & Sanders, W. H., Oct 13 2017, Proceedings - 2017 IEEE 36th International Symposium on Reliable Distributed Systems, SRDS 2017. IEEE Computer Society, p. 224-233 10 p. 8069085. (Proceedings of the IEEE Symposium on Reliable Distributed Systems; vol. 2017-September).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lateral
Detector
Attack
Detectors
Telecommunication traffic

ATTAIN: An Attack Injection Framework for Software-Defined Networking

Ujcich, B. E., Thakore, U. & Sanders, W. H., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 567-578 12 p. 8023155. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
Controllers
Industry

Data-driven model-based detection of malicious insiders via physical access logs

Cheh, C., Chen, B., Temple, W. G. & Sanders, W. H., Jan 1 2017, Quantitative Evaluation of Systems - 14th International Conference, QEST 2017, Proceedings. Bertrand, N. & Bortolussi, L. (eds.). Springer-Verlag, p. 275-291 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10503 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data-driven
Access control
Model-based
Control systems
Access Control

Developing models for physical atacks in cyber-physical systems

Cheh, C., Keefe, K., Feddersen, B., Chen, B., Temple, W. G. & Sanders, W. H., Nov 3 2017, CPS-SPC 2017 - Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 49-55 7 p. (CPS-SPC 2017 - Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, co-located with CCS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ontology
Security systems
Monitoring
Cyber Physical System

Learning process behavioral baselines for anomaly detection

Fawaz, A. M. & Sanders, W. H., May 5 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (eds.). IEEE Computer Society, p. 145-154 10 p. 7920608. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Engines

On train automatic stop control using balises: Attacks and a software-only countermeasure

Temple, W. G., Tran, B. A. N., Chen, B., Kalbarczyk, Z. T. & Sanders, W. H., May 5 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (eds.). IEEE Computer Society, p. 274-283 10 p. 7920632. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Availability
Controllers

REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks

Krishna, V. B., Rausch, M., Ujcich, B. E., Gupta, I. & Sanders, W. H., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 321-332 12 p. 8023133. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Error detection
Wireless sensor networks
Seismic waves
Sensors
Simulators

Towards an accountable software-defined networking architecture

Ujcich, B. E., Miller, A., Bates, A. & Sanders, W. H., Aug 7 2017, 2017 IEEE Conference on Network Softwarization: Softwarization Sustaining a Hyper-Connected World: en Route to 5G, NetSoft 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. (2017 IEEE Conference on Network Softwarization: Softwarization Sustaining a Hyper-Connected World: en Route to 5G, NetSoft 2017; vol. 2017-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
2016

A comparison of different intrusion detection approaches in an advanced metering infrastructure network using ADVISE

Rausch, M., Feddersen, B., Keefe, K. & Sanders, W. H., Jan 1 2016, Quantitative Evaluation of Systems - 13th International Conference, QEST 2016, Proceedings. Van Houdt, B. & Agha, G. (eds.). Springer-Verlag, p. 279-294 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9826 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Advanced metering infrastructures
Intrusion detection
Intrusion Detection
Infrastructure
Evaluation

A game-theoretic approach to respond to attacker lateral movement

Noureddine, M. A., Fawaz, A., Sanders, W. H. & Başar, T., Jan 1 2016, Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings. Panaousis, E., Tambe, M., Alpcan, T., Casey, W. & Zhu, Q. (eds.). Springer-Verlag, p. 294-313 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9996 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lateral
Game
Monitoring
Intrusion detection
Labels

A quantitative methodology for security monitor deployment

Thakore, U., Weaver, G. A. & Sanders, W. H., Sep 29 2016, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 1-12 12 p. 7579725. (Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Costs
Web services
Servers
Monitoring

A Response Cost Model for Advanced Metering Infrastructures

Fawaz, A., Berthier, R. & Sanders, W. H., Mar 2016, In : IEEE Transactions on Smart Grid. 7, 2, p. 543-553 11 p., 7114342.

Research output: Contribution to journalArticle

Advanced metering infrastructures
Costs
Outages
Dynamical systems
Topology

ARIMA-based modeling and validation of consumption readings in power grids

Krishna, V. B., Iyer, R. K. & Sanders, W. H., Jan 1 2016, Critical Information Infrastructures Security - 10th International Conference, CRITIS 2015, Revised Selected Papers. Wolthusen, S. D., Wolthusen, S. D., Theocharidou, M. & Rome, E. (eds.). Springer-Verlag, p. 199-210 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9578).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

ARIMA
Smart meters
Electricity
Grid
Modeling

Cyber-Physical Topology Language: Definition, Operations, and Application

Cheh, C., Weaver, G. A. & Sanders, W. H., Jan 4 2016, Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015. Xiang, D., Tsuchiya, T. & Wang, G. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 60-69 10 p. 7371417. (Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Topology
Security systems
Sensors
Formal logic
Graph theory

F-DETA: A framework for detecting electricity theft attacks in smart grids

Krishna, V. B., Lee, K., Weaver, G. A., Iyer, R. K. & Sanders, W. H., Sep 29 2016, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 407-418 12 p. 7579759. (Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electricity
Detectors
Smart meters
Communication
Costs

Lateral Movement Detection Using Distributed Data Fusion

Fawaz, A., Bohara, A., Cheh, C. & Sanders, W. H., Dec 21 2016, Proceedings - 2016 IEEE 35th International Symposium on Reliable Distributed Systems, SRDS 2016. IEEE Computer Society, p. 21-30 10 p. 7794326. (Proceedings of the IEEE Symposium on Reliable Distributed Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Causation
Data Fusion
Data fusion
Lateral
Fusion

Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios

Jauhar, S., Chen, B., Temple, W. G., Dong, X., Kalbarczyk, Z. T., Sanders, W. H. & Nicol, D. M., Jan 4 2016, Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015. Xiang, D., Tsuchiya, T. & Wang, G. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 319-324 6 p. 7371417. (Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry

The right tool for the job: A case for common input scenarios for security assessment

Dong, X., Jauhar, S., Temple, W. G., Chen, B., Kalbarczyk, Z. T., Sanders, W. H., Tippenhauer, N. O. & Nicol, D. M., Jan 1 2016, Graphical Models for Security - 3rd International Workshop, GraMSec 2016, Revised Selected Papers. Ekstedt, M., Kordy, B. & Kim, D. S. (eds.). Springer-Verlag, p. 39-61 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9987 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scenarios
Websites
Model-based
Concretes
Methodology
2015

A test bed for digital I&C and cyber security for NPPs

An, Y., Sollima, C., Rizwan-Uddin, Chen, D., Kalbarczyk, Z., Yardley, T. & Sanders, W., Jan 1 2015, 9th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies, NPIC and HMIT 2015. American Nuclear Society, p. 2496-2502 7 p. (9th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies, NPIC and HMIT 2015; vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nuclear power plants
Simulators
Controllers
Transmitters
Digital control systems

PCA-based method for detecting integrity attacks on advanced metering infrastructure

Krishna, V. B., Weaver, G. A. & Sanders, W. H., Jan 1 2015, Quantitative Evaluation of Systems - 12th International Conference, QEST 2015, Proceedings. Campos, J. & Haverkort, B. R. (eds.). Springer-Verlag, p. 70-85 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9259).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Advanced metering infrastructures
Smart meters
Principal component analysis
Integrity
Principal Component Analysis

Quantitative security metrics with human in the loop

Noureddine, M., Keefe, K., Sanders, W. H. & Bashir, M. N., Apr 21 2015, Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015. Association for Computing Machinery, 2746215. (ACM International Conference Proceeding Series; vol. 21-22-April-2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Human engineering
Uncertainty

Reliability analysis with dynamic reliability block diagrams in the Möbius modeling tool

Keefe, K. & Sanders, W. H., Jan 1 2015, 9th EAI International Conference on Performance Evaluation Methodologies and Tools, ValueTools 2015. Gribaudo, M., Reinecke, P., Wolter, K., Knottenbelt, W. & Busic, A. (eds.). ICST, (9th EAI International Conference on Performance Evaluation Methodologies and Tools, ValueTools 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reliability analysis
Metric system
User interfaces
Topology
Chemical analysis

Seclius: An information flow-based, consequence-centric security metric

Zonouz, S. A., Berthier, R., Khurana, H., Sanders, W. H. & Yardley, T., Feb 1 2015, In : IEEE Transactions on Parallel and Distributed Systems. 26, 2, p. 562-573 12 p., 6547151.

Research output: Contribution to journalArticle

Security systems
Critical infrastructures
Intrusion detection
Process control
Learning systems

Security analysis of urban railway systems: The need for a cyber-physical perspective

Chen, B., Schmittner, C., Ma, Z., Temple, W. G., Dong, X., Jones, D. L. & Sanders, W. H., Jan 1 2015, Computer Safety, Reliability, and Security - AFECOMP 2015 Workshops ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Proceedings. van Gulijk, C. & Koornneef, F. (eds.). Springer-Verlag, p. 277-290 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9338).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Analysis
Railway
Information and Communication Technology
Communication
Safety
2014

A framework for evaluating intrusion detection architectures in advanced metering infrastructures

Cárdenas, A. A., Berthier, R., Bobba, R. B., Huh, J. H., Jetcheva, J. G., Grochocki, D. & Sanders, W. H., Mar 1 2014, In : IEEE Transactions on Smart Grid. 5, 2, p. 906-915 10 p., 6740891.

Research output: Contribution to journalArticle

Advanced metering infrastructures
Intrusion detection
Costs
Planning
Communication

Automatic generation of security argument graphs

Tippenhauer, N. O., Temple, W. G., Vu, A. H., Chen, B., Nicol, D. M., Kalbarczyk, Z. & Sanders, W. H., Dec 3 2014, Proceedings - 20th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2014. IEEE Computer Society, p. 33-42 10 p. 6974749. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems

Enabling collaborative research for security and resiliency of energy cyber physical systems

Hussain, A., Faber, T., Braden, R., Benzel, T., Yardley, T., Jones, J., Nicol, D. M., Sanders, W. H., Edgar, T. W., Carroll, T. E., Manz, D. O. & Tinnel, L., Jan 1 2014, Proceedings - IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2014. IEEE Computer Society, p. 358-360 3 p. 6846190. (Proceedings - IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information science
Experiments
Cyber Physical System
Bioinformatics
Computer science
Artificial intelligence
Artificial Intelligence
Computer Science

Quantitative security metrics: Unattainable holy grail or a vital breakthrough within our reach?

Sanders, W. H., Jan 1 2014, In : IEEE Security and Privacy. 12, 2, p. 67-69 3 p., 6798561.

Research output: Contribution to journalArticle

Security systems
Decision making
decision making

Reliable GPS-based timing for power systems: A multi-layered multi-receiver architecture

Heng, L., Makela, J. J., Dominguez-Garcia, A. D., Bobba, R. B., Sanders, W. H. & Gao, G. X., Jan 1 2014.

Research output: Contribution to conferencePaper

Phasor measurement units
Global positioning system
Jamming
Electric power system measurement
Electric current measurement

RRE: A game-theoretic intrusion response and recovery engine

Zonouz, S. A., Khurana, H., Sanders, W. H. & Yardley, T. M., Feb 1 2014, In : IEEE Transactions on Parallel and Distributed Systems. 25, 2, p. 395-406 12 p., 6583161.

Research output: Contribution to journalArticle

Engines
Recovery
Network security
Fuzzy rules
Intrusion detection

SOCCA: A security-oriented cyber-physical contingency analysis in power infrastructures

Zonouz, S., Davis, C. M., Davis, K. R., Berthier, R., Bobba, R. B. & Sanders, W. H., Jan 1 2014, In : IEEE Transactions on Smart Grid. 5, 1, p. 3-13 11 p., 6687271.

Research output: Contribution to journalArticle

Topology
Cyber Physical System