William H Sanders

Interim Director, Discovery Partners Institute

1985 …2019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1985 2019

Filter
Conference contribution

A behavior-based process for evaluating availability achievement risk using stochastic activity networks

Beaudet, S. T., Courtney, T. & Sanders, W. H., Dec 1 2006, Annual Reliability and Maintainability Symposium, RAMS'06 - 2006 Proceedings. p. 21-28 8 p. 1677344. (Proceedings - Annual Reliability and Maintainability Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Availability
Engineers
Logistics
Large scale systems

A case study assessing the effects of cyber attacks on a river zonal dispatcher

Wright, R. J., Keefe, K., Feddersen, B. & Sanders, W. H., Jan 1 2017, Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers. Setola, R., Wolthusen, S., Nassopoulos, H., Havarneanu, G. & Wolthusen, S. (eds.). Springer-Verlag, p. 252-264 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10242 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rivers
Attack
Intrusion detection
Security systems
Catchments

Accounting for the human user in predictive security models

Noureddine, M. A., Marturano, A., Keefe, K., Bashiry, M. & Sanders, W. H., May 5 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (eds.). IEEE Computer Society, p. 329-338 10 p. 7920638. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social sciences
Security systems
Uncertainty

A comparison of different intrusion detection approaches in an advanced metering infrastructure network using ADVISE

Rausch, M., Feddersen, B., Keefe, K. & Sanders, W. H., Jan 1 2016, Quantitative Evaluation of Systems - 13th International Conference, QEST 2016, Proceedings. Van Houdt, B. & Agha, G. (eds.). Springer-Verlag, p. 279-294 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9826 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Advanced metering infrastructures
Intrusion detection
Intrusion Detection
Infrastructure
Evaluation

A compiler-enabled model- And measurement-driven adaptation environment for dependability and performance

Adve, V. S., Agbaria, A., Hiltunen, M. A., Iyer, R. K., Joshi, K. R., Kalbarczyk, Z., Lefever, R. M., Plante, R., Sanders, W. H. & Schlichting, R. D., Dec 1 2005, Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005. 1420134. (Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Error detection

A component-level path-based simulation approach for efficient analysis of large Markov models

Lam, V. V., Buchholz, P. & Sanders, W. H., Dec 1 2005, Proceedings of the 2005 Winter Simulation Conference. p. 584-590 7 p. 1574298. (Proceedings - Winter Simulation Conference; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Markov Model
Path
Trajectories
Simulation
Discrete event simulation

A component-level path composition approach for efficient transient analysis of large CTMCs

Lam, V. V., Buchholz, P. & Sanders, W. H., Dec 22 2006, Proceedings - DSN 2006: 2006 International Conference on Dependable Systems and Networks. p. 485-494 10 p. 1633537. (Proceedings of the International Conference on Dependable Systems and Networks; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Transient analysis
Chemical analysis
Information services
Computational complexity
Availability

Adversary-driven state-based system security evaluation

LeMay, E., Unkenholz, W., Parks, D., Muehrcke, C., Keefe, K. & Sanders, W. H., Dec 1 2010, 6th International Workshop on Security Measurements and Metrics, MetriSec 2010. 1853926. (6th International Workshop on Security Measurements and Metrics, MetriSec 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems

A dynamic replica selection algorithm for tolerating timing faults

Krishnamurthy, S., Sanders, W. H. & Cukier, M., Dec 1 2001, Proceedings of the International Conference on Dependable Systems and Networks. Young, D. C. & Young, D. C. (eds.). p. 107-116 10 p. (Proceedings of the International Conference on Dependable Systems and Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Common object request broker architecture (CORBA)
Fault tolerance
Middleware
Set theory

A framework for efficient evaluation of the fault tolerance of deduplicated storage systems

Rozier, E. W. D. & Sanders, W. H., Oct 1 2012, 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012. 6263921. (Proceedings of the International Conference on Dependable Systems and Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fault tolerance
Discrete event simulation
Specifications

A game-theoretic approach to respond to attacker lateral movement

Noureddine, M. A., Fawaz, A., Sanders, W. H. & Başar, T., Jan 1 2016, Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings. Panaousis, E., Tambe, M., Alpcan, T., Casey, W. & Zhu, Q. (eds.). Springer-Verlag, p. 294-313 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9996 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lateral
Game
Monitoring
Intrusion detection
Labels

A Kalman-based coordination for hierarchical state estimation: Algorithm and analysis

Zonouz, S. A. & Sanders, W. H., Sep 16 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences 2008, HICSS. 4438891. (Proceedings of the Annual Hawaii International Conference on System Sciences).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation
Communication
Bandwidth
Electric power system interconnection

A mirrored data structures approach to diverse partial memory replication

Lefever, R. M., Adve, V. S. & Sanders, W. H., Jul 30 2012, Proceedings - 9th European Dependable Computing Conference, EDCC 2012. p. 61-72 12 p. 6214761. (Proceedings - 9th European Dependable Computing Conference, EDCC 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data structures
Data storage equipment
Storage allocation (computer)

AMI threats, intrusion detection requirements and deployment recommendations

Grochocki, D., Huh, J. H., Berthier, R., Bobba, R., Sanders, W. H., Cardenas, A. A. & Jetcheva, J. G., Dec 1 2012, 2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012. p. 395-400 6 p. 6486016. (2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Advanced metering infrastructures
Smart meters
Intrusion detection
threat
infrastructure

A model-based foundation for evaluating large scale telecommunications systems

Obal, W. D. & Sanders, W. H., Jan 1 1993, Proceedings of Phoenix Conference on Computers and Communications, PCCC 1993. Institute of Electrical and Electronics Engineers Inc., p. 367-369 3 p. 344502. (Proceedings of Phoenix Conference on Computers and Communications, PCCC 1993).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Importance sampling
Telecommunication systems

A modular method for evaluating the performance of picture archiving and communication systems

Kudrimoti, A. S. & Sanders, W. H., Jan 1 1992, Computer-Based Medical Systems - Proceedings of the 5th Annual IEEE Symposium, CBMS 1992. Institute of Electrical and Electronics Engineers Inc., p. 44-53 10 p. 244964. (Proceedings - IEEE Symposium on Computer-Based Medical Systems; vol. 1992-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radiology Information Systems
Picture archiving and communication systems
Hospital beds
Reaction Time
Software

An actor-centric, asset-based monitor deployment model for cloud computing

Thakore, U., Weaver, G. A. & Sanders, W. H., Jan 1 2013, Proceedings - 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, UCC 2013. IEEE Computer Society, p. 311-312 2 p. 6809423. (Proceedings - 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, UCC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Monitoring

An adaptive framework for tunable consistency and timeliness using replication

Krishnamurthy, S., Sanders, W. H. & Cukier, M., Dec 1 2002, Proceedings of the 2002 International Conference on Dependable Systems and Networks. p. 17-26 10 p. (Proceedings of the 2002 International Conference on Dependable Systems and Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quality of service
Specifications
Monitoring

An efficient disk-based tool for solving very large markov models

Deavours, D. D. & Sanders, W. H., Jan 1 1997, Computer Performance Evaluation: Modelling Techniques and Tools - 9th International Conference, 1997, Proceedings. Marie, R., Plateau, B., Rubino, G. & Calzarossa, M. (eds.). Springer-Verlag, p. 58-71 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1245).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Markov Model
Gauss-Seidel
Computer Modeling
Iterative Solution
State Transition

An Efficient Strategy for Model Composition in the Möbius Modeling Environment

Masetti, G., Chiaradonna, S., Di Giandomenico, F., Feddersen, B. & Sanders, W. H., Nov 9 2018, Proceedings - 2018 14th European Dependable Computing Conference, EDCC 2018. Institute of Electrical and Electronics Engineers Inc., p. 116-119 4 p. 8530770. (Proceedings - 2018 14th European Dependable Computing Conference, EDCC 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chemical analysis
Modeling
Dependability
Data Flow
Infrastructure

An efficient well-specified check

Deavours, D. D. & Sanders, W. H., Jan 1 1999, Proceedings - 8th International Workshop on Petri Nets and Performance Models, PNPM 1999. Institute of Electrical and Electronics Engineers Inc., p. 124-133 10 p. 796559. (Proceedings - 8th International Workshop on Petri Nets and Performance Models, PNPM 1999).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unstable
Directly proportional
Generalized Stochastic Petri Net
Petri nets
Reward

An experimental evaluation of correlated network partitions in the coda distributed file system

Lefever, R. M., Cukier, M. & Sanders, W. H., Dec 1 2003, Proceedings - 22nd International Symposium on Reliable Distributed Systems, SRDS 2003. p. 273-282 10 p. (Proceedings of the IEEE Symposium on Reliable Distributed Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed File System
Experimental Evaluation
Servers
Partition
Repair

An Ontology Framework for Generating Discrete-Event Stochastic Models

Keefe, K., Feddersen, B., Rausch, M., Wright, R. & Sanders, W. H., Jan 1 2018, Computer Performance Engineering - 15th European Workshop, EPEW 2018, Proceedings. Remke, A., Ballarini, P., Barbot, B., Bakhshi, R. & Castel-Taleb, H. (eds.). Springer-Verlag, p. 173-189 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11178 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discrete Event
Stochastic models
Stochastic Model
Ontology
Model

An unsupervised multi-detector approach for identifying malicious lateral movement

Bohara, A., Noureddine, M. A., Fawaz, A. & Sanders, W. H., Oct 13 2017, Proceedings - 2017 IEEE 36th International Symposium on Reliable Distributed Systems, SRDS 2017. IEEE Computer Society, p. 224-233 10 p. 8069085. (Proceedings of the IEEE Symposium on Reliable Distributed Systems; vol. 2017-September).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lateral
Detector
Attack
Detectors
Telecommunication traffic

Approximate computation of transient results for large Markov chains

Buchholz, P. & Sanders, W. H., Dec 1 2004, Proceedings - First International Conference on the Quantitative Evaluation of Systems, QEST 2004. p. 126-135 10 p. (Proceedings - First International Conference on the Quantitative Evaluation of Systems, QEST 2004).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Markov processes
Transient analysis

A project to develop a trustworthy cyber infrastructure for the power grid (TCIPG)

Sauer, P. W. & Sanders, W. H., Dec 11 2012, 2012 IEEE Power and Energy Society General Meeting, PES 2012. 6345765. (IEEE Power and Energy Society General Meeting).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Education
Engineers
Industry

A provenance model for the european union general data protection regulation

Ujcich, B. E., Bates, A. & Sanders, W. H., Jan 1 2018, Provenance and Annotation of Data and Processes - 7th International Provenance and Annotation Workshop, IPAW 2018, Proceedings. Belhajjame, K., Gehani, A. & Alper, P. (eds.). Springer-Verlag, p. 45-57 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11017 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Provenance
Union
Model
Compliance

A quantitative methodology for security monitor deployment

Thakore, U., Weaver, G. A. & Sanders, W. H., Sep 29 2016, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 1-12 12 p. 7579725. (Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Costs
Web services
Servers
Monitoring

ARIMA-based modeling and validation of consumption readings in power grids

Krishna, V. B., Iyer, R. K. & Sanders, W. H., Jan 1 2016, Critical Information Infrastructures Security - 10th International Conference, CRITIS 2015, Revised Selected Papers. Wolthusen, S. D., Wolthusen, S. D., Theocharidou, M. & Rome, E. (eds.). Springer-Verlag, p. 199-210 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9578).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

ARIMA
Smart meters
Electricity
Grid
Modeling

A structured path-based approach for computing transient rewards of large CTMCs

Lam, V. V., Buchholz, P. & Sanders, W. H., Dec 1 2004, Proceedings - First International Conference on the Quantitative Evaluation of Systems, QEST 2004. p. 136-145 10 p. (Proceedings - First International Conference on the Quantitative Evaluation of Systems, QEST 2004).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Markov processes
Information services
Availability

A test bed for digital I&C and cyber security for NPPs

An, Y., Sollima, C., Rizwan-Uddin, Chen, D., Kalbarczyk, Z., Yardley, T. & Sanders, W., Jan 1 2015, 9th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies, NPIC and HMIT 2015. American Nuclear Society, p. 2496-2502 7 p. (9th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies, NPIC and HMIT 2015; vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nuclear power plants
Simulators
Controllers
Transmitters
Digital control systems

ATTAIN: An Attack Injection Framework for Software-Defined Networking

Ujcich, B. E., Thakore, U. & Sanders, W. H., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 567-578 12 p. 8023155. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
Controllers
Industry

Automatically generating security models from system models to aid in the evaluation of AMI deployment options

Rausch, M., Keefe, K., Feddersen, B. & Sanders, W. H., Jan 1 2018, Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers. D’Agostino, G. & Scala, A. (eds.). Springer-Verlag, p. 156-167 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10707 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Advanced metering infrastructures
Security Model
Infrastructure
Evaluation
Ontology

Automatic generation of security argument graphs

Tippenhauer, N. O., Temple, W. G., Vu, A. H., Chen, B., Nicol, D. M., Kalbarczyk, Z. & Sanders, W. H., Dec 3 2014, Proceedings - 20th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2014. IEEE Computer Society, p. 33-42 10 p. 6974749. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems

Automatic recovery using bounded partially observable Markov decision processes

Joshi, K. R., Hiltunen, M. A., Sanders, W. H. & Schlichting, R. D., Dec 22 2006, Proceedings - DSN 2006: 2006 International Conference on Dependable Systems and Networks. p. 445-454 10 p. 1633533. (Proceedings of the International Conference on Dependable Systems and Networks; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recovery
Controllers
Costs

Barbarians in the gate: An experimental validation of NIC-based distributed firewall performance and flood tolerance

Ihde, M. & Sanders, W. H., Dec 22 2006, Proceedings - DSN 2006: 2006 International Conference on Dependable Systems and Networks. p. 209-214 6 p. 1633510. (Proceedings of the International Conference on Dependable Systems and Networks; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Interfaces (computer)
Network security
Bandwidth
Experiments

Bound-preserving composition for Markov reward models

Daly, D., Buchholz, P. & Sanders, W. H., Dec 1 2006, Third International Conference on the Quantitative Evaluation of Systems, QEST 2006. p. 243-252 10 p. 1704018. (Third International Conference on the Quantitative Evaluation of Systems, QEST 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reward
Chemical analysis
Stochastic Order
Model
Aggregation

Brief announcement: The coBFIT toolkit

Ramasamy, H. G., Seri, M. & Sanders, W. H., Dec 14 2007, PODC'07: Proceedings of the 26th Annual ACM Symposium on Principles of Distributed Computing. p. 350-351 2 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Building dependable distributed applications using AQUA

Ren, J., Cukier, M., Rubel, P., Sanders, W. H., Bakken, D. E. & Karr, D. A., Jan 1 1999, Proceedings - 4th IEEE International Symposium on High-Assurance Systems Engineering, HASE 1999. Institute of Electrical and Electronics Engineers Inc., p. 189-196 8 p. 809494. (Proceedings - 4th IEEE International Symposium on High-Assurance Systems Engineering, HASE 1999).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fault tolerance
Common object request broker architecture (CORBA)
Monitoring
Costs

Content-based scheduling of virtual machines (VMs) in the cloud

Bazarbayev, S., Hiltunen, M., Joshi, K., Sanders, W. H. & Schlichting, R., Dec 1 2013, Proceedings - 2013 IEEE 33rd International Conference on Distributed Computing Systems, ICDCS 2013. p. 93-101 9 p. 6681579. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scheduling
Computer operating systems
Scheduling algorithms
Virtual machine
Data transfer

Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment

Zonouz, S. A., Joshi, K. R. & Sanders, W. H., Dec 20 2010, Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig '10, Co-located with CCS'10. p. 71-74 4 p. 1866910. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Detectors
Costs
Online systems
Botnet

Cost modeling of response actions for automated response and recovery in AMI

Fawaz, A., Berthier, R. & Sanders, W. H., Dec 1 2012, 2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012. p. 348-353 6 p. 6486008. (2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Advanced metering infrastructures
incident
infrastructure
Recovery
costs

CPU gadients: Performance-aware energy conservation in multitier systems

Chen, S., Joshi, K. R., Hiltunen, M. A., Schlichting, R. D. & Sanders, W. H., Nov 24 2010, 2010 International Conference on Green Computing, Green Comp 2010. p. 15-29 15 p. 5598296. (2010 International Conference on Green Computing, Green Comp 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Program processors
Energy conservation
Computer systems
Response time (computer systems)
Consolidation

Cross-app poisoning in software-defined networking

Ujcich, B. E., Jero, S., Edmundson, A., Wang, Q., Skowyra, R., Landry, J., Bates, A., Sanders, W. H., Nita-Rotaru, C. & Okhravi, H., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 648-663 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
Application programs
Flow control
Access control
Controllers

Cyber-Physical Topology Language: Definition, Operations, and Application

Cheh, C., Weaver, G. A. & Sanders, W. H., Jan 4 2016, Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015. Xiang, D., Tsuchiya, T. & Wang, G. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 60-69 10 p. 7371417. (Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Topology
Security systems
Sensors
Formal logic
Graph theory

Data analysis and visualization within the Möbius modeling environment

Courtney, T., Gaonkar, S., Griffith, M., Lam, V., McQuinn, M., Rozier, E. & Sanders, W. H., Dec 1 2006, Third International Conference on the Quantitative Evaluation of Systems, QEST 2006. p. 137-138 2 p. 1704006. (Third International Conference on the Quantitative Evaluation of Systems, QEST 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data visualization
Data Visualization
Discrete event simulation
Data analysis
Visualization

Data-driven model-based detection of malicious insiders via physical access logs

Cheh, C., Chen, B., Temple, W. G. & Sanders, W. H., Jan 1 2017, Quantitative Evaluation of Systems - 14th International Conference, QEST 2017, Proceedings. Bertrand, N. & Bortolussi, L. (eds.). Springer-Verlag, p. 275-291 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10503 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data-driven
Access control
Model-based
Control systems
Access Control

Data protection intents for software-defined networking

Ujcich, B. E. & Sanders, W. H., Jun 2019, Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019. Jacquenet, C., De Turck, F., Chemouil, P., Esposito, F., Festor, O., Cerroni, W. & Secci, S. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 271-275 5 p. 8806684. (Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Software defined networking
Industry
Controllers

Definition and evaluation of the data-link layer of PACnet

Alsafadi, Y. H., Martinez, R. & Sanders, W. H., 1991, Proceedings of SPIE - The International Society for Optical Engineering. Publ by Int Soc for Optical Engineering, Vol. 1446. p. 129-140 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

data links
Interfaces (computer)
Network protocols
Picture archiving and communication systems
evaluation

Dependability analysis with Markov Chains: How symmetries improve symbolic computations

McQuinn, M. G., Kemper, P. & Sanders, W. H., Dec 1 2007, Proceedings - 4th International Conference on the Quantitative Evaluation of Systems, QEST 2007. p. 151-160 10 p. 4338250. (Proceedings - 4th International Conference on the Quantitative Evaluation of Systems, QEST 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dependability
Symbolic Computation
Markov processes
Markov chain
Symmetry