William H Sanders

Interim Director, Discovery Partners Institute

1985 …2019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1985 2019

Filter
Conference contribution
2019

Data protection intents for software-defined networking

Ujcich, B. E. & Sanders, W. H., Jun 2019, Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019. Jacquenet, C., De Turck, F., Chemouil, P., Esposito, F., Festor, O., Cerroni, W. & Secci, S. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 271-275 5 p. 8806684. (Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Software defined networking
Industry
Controllers

Determining tolerable attack surfaces that preserves safety of cyber-physical systems

Cheh, C., Fawaz, A., Noureddine, M. A., Chen, B., Temple, W. G. & Sanders, W. H., Feb 11 2019, Proceedings - 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing, PRDC 2018. IEEE Computer Society, p. 125-134 10 p. 8639695. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC; vol. 2018-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Network protocols
Cyber Physical System

P4AIG: Circuit-Level Verification of P4 Programs

Noureddine, M. A., Hsu, A., Caesar, M. C., Zaraket, F. A. & Sanders, W. H., Jun 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019. Institute of Electrical and Electronics Engineers Inc., p. 21-22 2 p. 8805757. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Networks (circuits)
Sequential circuits
Electric network analysis
Scalability
Pipelines

Revisiting Client Puzzles for State Exhaustion Attacks Resilience

Noureddine, M. A., Fawaz, A. M., Hsu, A., Guldner, C., Vijay, S., Basar, M. T. & Sanders, W. H., Jun 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019. Institute of Electrical and Electronics Engineers Inc., p. 617-629 13 p. 8809536. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Testbeds
Servers
Experiments
Linux
2018

An Efficient Strategy for Model Composition in the Möbius Modeling Environment

Masetti, G., Chiaradonna, S., Di Giandomenico, F., Feddersen, B. & Sanders, W. H., Nov 9 2018, Proceedings - 2018 14th European Dependable Computing Conference, EDCC 2018. Institute of Electrical and Electronics Engineers Inc., p. 116-119 4 p. 8530770

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chemical analysis
Modeling
Dependability
Data Flow
Infrastructure

An Ontology Framework for Generating Discrete-Event Stochastic Models

Keefe, K., Feddersen, B., Rausch, M., Wright, R. & Sanders, W. H., Jan 1 2018, Computer Performance Engineering - 15th European Workshop, EPEW 2018, Proceedings. Remke, A., Ballarini, P., Barbot, B., Bakhshi, R. & Castel-Taleb, H. (eds.). Springer-Verlag, p. 173-189 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11178 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discrete Event
Stochastic models
Stochastic Model
Ontology
Model

A provenance model for the european union general data protection regulation

Ujcich, B. E., Bates, A. & Sanders, W. H., Jan 1 2018, Provenance and Annotation of Data and Processes - 7th International Provenance and Annotation Workshop, IPAW 2018, Proceedings. Belhajjame, K., Gehani, A. & Alper, P. (eds.). Springer-Verlag, p. 45-57 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11017 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Provenance
Union
Model
Compliance

Automatically generating security models from system models to aid in the evaluation of AMI deployment options

Rausch, M., Keefe, K., Feddersen, B. & Sanders, W. H., Jan 1 2018, Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers. D’Agostino, G. & Scala, A. (eds.). Springer-Verlag, p. 156-167 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10707 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Advanced metering infrastructures
Security Model
Infrastructure
Evaluation
Ontology

Cross-app poisoning in software-defined networking

Ujcich, B. E., Jero, S., Edmundson, A., Wang, Q., Skowyra, R., Landry, J., Bates, A. M., Sanders, W. H., Nita-Rotaru, C. & Okhravi, H., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 648-663 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
Application programs
Flow control
Access control
Controllers

Modeling humans: A general agent model for the evaluation of security

Rausch, M., Fawaz, A., Keefe, K. & Sanders, W. H., Jan 1 2018, Quantitative Evaluation of Systems - 15th International Conference, QEST 2018, Proceedings. Horvath, A. & McIver, A. (eds.). Springer-Verlag, p. 373-388 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11024 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Evaluation
Modeling
Planning
Security Model
User Behavior

Peer-to-peer Detection of DoS Attacks on City-Scale IoT Mesh Networks

Rausch, M. J., Krishna, V. B., Gu, P., Chandra, R., Feddersen, B., Fawaz, A. & Sanders, W. H., Dec 24 2018, 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018. Institute of Electrical and Electronics Engineers Inc., 8587518. (2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer networks
Topology
Smart meters
Monitoring
Communication

Poster: Detecting monitor compromise using evidential reasoning

Thakore, U., Fawaz, A. & Sanders, W. H., Apr 10 2018, Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2018. Association for Computing Machinery, 3191693. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

POWERALERT: Integrity checking using power measurement and a Game-Theoretic strategy

Fawaz, A. M., Noureddine, M. A. & Sanders, W. H., Jul 19 2018, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018. Institute of Electrical and Electronics Engineers Inc., p. 514-525 12 p. 8416511. (Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
2017

A case study assessing the effects of cyber attacks on a river zonal dispatcher

Wright, R. J., Keefe, K., Feddersen, B. & Sanders, W. H., Jan 1 2017, Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers. Setola, R., Wolthusen, S., Nassopoulos, H., Havarneanu, G. & Wolthusen, S. (eds.). Springer-Verlag, p. 252-264 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10242 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rivers
Attack
Intrusion detection
Security systems
Catchments

Accounting for the human user in predictive security models

Noureddine, M. A., Marturano, A., Keefe, K., Bashiry, M. & Sanders, W. H., May 5 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (eds.). IEEE Computer Society, p. 329-338 10 p. 7920638. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social sciences
Security systems
Uncertainty

An unsupervised multi-detector approach for identifying malicious lateral movement

Bohara, A., Noureddine, M. A., Fawaz, A. & Sanders, W. H., Oct 13 2017, Proceedings - 2017 IEEE 36th International Symposium on Reliable Distributed Systems, SRDS 2017. IEEE Computer Society, p. 224-233 10 p. 8069085. (Proceedings of the IEEE Symposium on Reliable Distributed Systems; vol. 2017-September).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lateral
Detector
Attack
Detectors
Telecommunication traffic

ATTAIN: An Attack Injection Framework for Software-Defined Networking

Ujcich, B. E., Thakore, U. & Sanders, W. H., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 567-578 12 p. 8023155. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
Controllers
Industry

Data-driven model-based detection of malicious insiders via physical access logs

Cheh, C., Chen, B., Temple, W. G. & Sanders, W. H., Jan 1 2017, Quantitative Evaluation of Systems - 14th International Conference, QEST 2017, Proceedings. Bertrand, N. & Bortolussi, L. (eds.). Springer-Verlag, p. 275-291 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10503 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data-driven
Access control
Model-based
Control systems
Access Control

Developing models for physical atacks in cyber-physical systems

Cheh, C., Keefe, K., Feddersen, B., Chen, B., Temple, W. G. & Sanders, W. H., Nov 3 2017, CPS-SPC 2017 - Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 49-55 7 p. (CPS-SPC 2017 - Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, co-located with CCS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ontology
Security systems
Monitoring
Cyber Physical System

Learning process behavioral baselines for anomaly detection

Fawaz, A. M. & Sanders, W. H., May 5 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (eds.). IEEE Computer Society, p. 145-154 10 p. 7920608. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Engines

On train automatic stop control using balises: Attacks and a software-only countermeasure

Temple, W. G., Tran, B. A. N., Chen, B., Kalbarczyk, Z. T. & Sanders, W. H., May 5 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (eds.). IEEE Computer Society, p. 274-283 10 p. 7920632. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Availability
Controllers

REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks

Krishna, V. B., Rausch, M., Ujcich, B. E., Gupta, I. & Sanders, W. H., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 321-332 12 p. 8023133. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Error detection
Wireless sensor networks
Seismic waves
Sensors
Simulators

Towards an accountable software-defined networking architecture

Ujcich, B. E., Miller, A., Bates, A. & Sanders, W. H., Aug 7 2017, 2017 IEEE Conference on Network Softwarization: Softwarization Sustaining a Hyper-Connected World: en Route to 5G, NetSoft 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. (2017 IEEE Conference on Network Softwarization: Softwarization Sustaining a Hyper-Connected World: en Route to 5G, NetSoft 2017; vol. 2017-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
2016

A comparison of different intrusion detection approaches in an advanced metering infrastructure network using ADVISE

Rausch, M., Feddersen, B., Keefe, K. & Sanders, W. H., Jan 1 2016, Quantitative Evaluation of Systems - 13th International Conference, QEST 2016, Proceedings. Springer Verlag, Vol. 9826 LNCS. p. 279-294 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9826 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Advanced metering infrastructures
Intrusion detection
Intrusion Detection
Infrastructure
Evaluation

A game-theoretic approach to respond to attacker lateral movement

Noureddine, M. A., Fawaz, A., Sanders, W. H. & Başar, T., Jan 1 2016, Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings. Panaousis, E., Tambe, M., Alpcan, T., Casey, W. & Zhu, Q. (eds.). Springer-Verlag, p. 294-313 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9996 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lateral
Game
Monitoring
Intrusion detection
Labels

A quantitative methodology for security monitor deployment

Thakore, U., Weaver, G. A. & Sanders, W. H., Sep 29 2016, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 1-12 12 p. 7579725. (Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Costs
Web services
Servers
Monitoring

ARIMA-based modeling and validation of consumption readings in power grids

Krishna, V. B., Iyer, R. K. & Sanders, W. H., Jan 1 2016, Critical Information Infrastructures Security - 10th International Conference, CRITIS 2015, Revised Selected Papers. Wolthusen, S. D., Wolthusen, S. D., Theocharidou, M. & Rome, E. (eds.). Springer-Verlag, p. 199-210 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9578).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

ARIMA
Smart meters
Electricity
Grid
Modeling

Cyber-Physical Topology Language: Definition, Operations, and Application

Cheh, C., Weaver, G. A. & Sanders, W. H., Jan 4 2016, Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015. Xiang, D., Tsuchiya, T. & Wang, G. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 60-69 10 p. 7371417. (Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Topology
Security systems
Sensors
Formal logic
Graph theory

F-DETA: A framework for detecting electricity theft attacks in smart grids

Krishna, V. B., Lee, K., Weaver, G. A., Iyer, R. K. & Sanders, W. H., Sep 29 2016, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 407-418 12 p. 7579759. (Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electricity
Detectors
Smart meters
Communication
Costs

Lateral Movement Detection Using Distributed Data Fusion

Fawaz, A., Bohara, A., Cheh, C. & Sanders, W. H., Dec 21 2016, Proceedings - 2016 IEEE 35th International Symposium on Reliable Distributed Systems, SRDS 2016. IEEE Computer Society, p. 21-30 10 p. 7794326. (Proceedings of the IEEE Symposium on Reliable Distributed Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Causation
Data Fusion
Data fusion
Lateral
Fusion

Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios

Jauhar, S., Chen, B., Temple, W. G., Dong, X., Kalbarczyk, Z. T., Sanders, W. H. & Nicol, D. M., Jan 4 2016, Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015. Xiang, D., Tsuchiya, T. & Wang, G. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 319-324 6 p. 7371417. (Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry

The right tool for the job: A case for common input scenarios for security assessment

Dong, X., Jauhar, S., Temple, W. G., Chen, B., Kalbarczyk, Z. T., Sanders, W. H., Tippenhauer, N. O. & Nicol, D. M., Jan 1 2016, Graphical Models for Security - 3rd International Workshop, GraMSec 2016, Revised Selected Papers. Ekstedt, M., Kordy, B. & Kim, D. S. (eds.). Springer-Verlag, p. 39-61 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9987 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scenarios
Websites
Model-based
Concretes
Methodology
2015

A test bed for digital I&C and cyber security for NPPs

An, Y., Sollima, C., Rizwan-Uddin, Chen, D., Kalbarczyk, Z., Yardley, T. & Sanders, W., Jan 1 2015, 9th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies, NPIC and HMIT 2015. American Nuclear Society, p. 2496-2502 7 p. (9th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies, NPIC and HMIT 2015; vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nuclear power plants
Simulators
Controllers
Transmitters
Digital control systems

PCA-based method for detecting integrity attacks on advanced metering infrastructure

Krishna, V. B., Weaver, G. A. & Sanders, W. H., Jan 1 2015, Quantitative Evaluation of Systems - 12th International Conference, QEST 2015, Proceedings. Campos, J. & Haverkort, B. R. (eds.). Springer-Verlag, p. 70-85 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9259).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Advanced metering infrastructures
Smart meters
Principal component analysis
Integrity
Principal Component Analysis

Quantitative security metrics with human in the loop

Noureddine, M., Keefe, K., Sanders, W. H. & Bashir, M. N., Apr 21 2015, Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015. Association for Computing Machinery, 2746215. (ACM International Conference Proceeding Series; vol. 21-22-April-2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Human engineering
Uncertainty

Reliability analysis with dynamic reliability block diagrams in the Möbius modeling tool

Keefe, K. & Sanders, W. H., Jan 1 2015, 9th EAI International Conference on Performance Evaluation Methodologies and Tools, ValueTools 2015. Gribaudo, M., Reinecke, P., Wolter, K., Knottenbelt, W. & Busic, A. (eds.). ICST, (9th EAI International Conference on Performance Evaluation Methodologies and Tools, ValueTools 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reliability analysis
Metric system
User interfaces
Topology
Chemical analysis

Security analysis of urban railway systems: The need for a cyber-physical perspective

Chen, B., Schmittner, C., Ma, Z., Temple, W. G., Dong, X., Jones, D. L. & Sanders, W. H., Jan 1 2015, Computer Safety, Reliability, and Security - AFECOMP 2015 Workshops ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Proceedings. van Gulijk, C. & Koornneef, F. (eds.). Springer-Verlag, p. 277-290 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9338).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Analysis
Railway
Information and Communication Technology
Communication
Safety
2014

Automatic generation of security argument graphs

Tippenhauer, N. O., Temple, W. G., Vu, A. H., Chen, B., Nicol, D. M., Kalbarczyk, Z. T. & Sanders, W. H., Dec 3 2014, Proceedings - 20th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2014. IEEE Computer Society, p. 33-42 10 p. 6974749. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems

Enabling collaborative research for security and resiliency of energy cyber physical systems

Hussain, A., Faber, T., Braden, R., Benzel, T., Yardley, T., Jones, J., Nicol, D. M., Sanders, W. H., Edgar, T. W., Carroll, T. E., Manz, D. O. & Tinnel, L., Jan 1 2014, Proceedings - IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2014. IEEE Computer Society, p. 358-360 3 p. 6846190. (Proceedings - IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information science
Experiments
Cyber Physical System
2013

An actor-centric, asset-based monitor deployment model for cloud computing

Thakore, U., Weaver, G. A. & Sanders, W. H., Jan 1 2013, Proceedings - 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, UCC 2013. IEEE Computer Society, p. 311-312 2 p. 6809423. (Proceedings - 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, UCC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Monitoring

Content-based scheduling of virtual machines (VMs) in the cloud

Bazarbayev, S., Hiltunen, M., Joshi, K., Sanders, W. H. & Schlichting, R., Dec 1 2013, Proceedings - 2013 IEEE 33rd International Conference on Distributed Computing Systems, ICDCS 2013. p. 93-101 9 p. 6681579. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scheduling
Computer operating systems
Scheduling algorithms
Virtual machine
Data transfer

Formal design of communication checkers for ICCP using UPPAAL

Malik, S., Berthier, R., Bobba, R. B., Campbell, R. H. & Sanders, W. H., 2013, 2013 IEEE International Conference on Smart Grid Communications, SmartGridComm 2013. p. 486-491 6 p. 6688005

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Communication
Electronic data interchange

Go with the flow: Toward workflow-oriented security assessment

Chen, B., Kalbarczyk, Z. T., Nicol, D. M., Sanders, W. H., Tan, R., Temple, W. G., Tippenhauer, N. O., Vu, A. H. & Yau, D. K. Y., Dec 1 2013, NSPW 2013 - Proceedings of the 2013 New Security Paradigms Workshop. p. 65-76 12 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart power grids
Advanced metering infrastructures
Information systems
Availability

Implementing the ADVISE security modeling formalism in Möbius

Ford, M. D., Keefe, K., Lemay, E., Sanders, W. H. & Muehrcke, C., Sep 9 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2013. 6575362. (Proceedings of the International Conference on Dependable Systems and Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems

Malicious data detection in state estimation leveraging system losses & estimation of perturbed parameters

Niemira, W., Bobba, R. B., Sauer, P. W. & Sanders, W. H., Dec 1 2013, 2013 IEEE International Conference on Smart Grid Communications, SmartGridComm 2013. p. 402-407 6 p. 6687991. (2013 IEEE International Conference on Smart Grid Communications, SmartGridComm 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation
Parameter estimation
Random errors
Topology

Möbius Shell: A command-line interface for Möbius

Keefe, K. & Sanders, W. H., 2013, Quantitative Evaluation of Systems - 10th International Conference, QEST 2013, Proceedings. Vol. 8054 LNCS. p. 282-285 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8054 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shell
Line
Graphical user interfaces
Metric
Discrete Event

PSCloud: A durable context-aware personal storage cloud

Bazarbayev, S., Hiltunen, M., Joshi, K., Sanders, W. H. & Schlichting, R., 2013, Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, HotDep 2013. Association for Computing Machinery

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Durability
Servers
Costs
Experiments

Reconciling security protection and monitoring requirements in advanced metering infrastructures

Berthier, R., Jetcheva, J. G., Mashima, D., Huh, J. H., Grochocki, D., Bobba, R. B., Cárdenas, A. A. & Sanders, W. H., Dec 1 2013, 2013 IEEE International Conference on Smart Grid Communications, SmartGridComm 2013. p. 450-455 6 p. 6687999. (2013 IEEE International Conference on Smart Grid Communications, SmartGridComm 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Advanced metering infrastructures
Monitoring
Cryptography
Inspection
Availability

Smart grid protocol testing through cyber-physical testbeds

Yardley, T., Berthier, R., Nicol, D. M. & Sanders, W. H., May 6 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference, ISGT 2013. 6497837. (2013 IEEE PES Innovative Smart Grid Technologies Conference, ISGT 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Testbeds
Network protocols
Testing
Advanced metering infrastructures
Formal methods

Toward a cyber-physical topology language: Applications to NERC CIP audit

Weaver, G. A., Cheh, C., Rogers, E. J., Sanders, W. H. & Gammel, D., Dec 9 2013, SEGS 2013 - Proceedings of the 2013 ACM Workshop on Smart Energy Grid Security, Co-located with CCS 2013. p. 93-104 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Critical infrastructures
Topology
Industry
Graph theory
Outages