Find Research Outputs

Search in all content

Filters for Research & Scholarship

Search concepts
Selected Filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • William H Sanders
2018

Cross-app poisoning in software-defined networking

Ujcich, B. E., Jero, S., Edmundson, A., Wang, Q., Skowyra, R., Landry, J., Bates, A., Sanders, W. H., Nita-Rotaru, C. & Okhravi, H., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 648-663 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

ARIMA-based modeling and validation of consumption readings in power grids

Krishna, V. B., Iyer, R. K. & Sanders, W. H., Jan 1 2016, Critical Information Infrastructures Security - 10th International Conference, CRITIS 2015, Revised Selected Papers. Wolthusen, S. D., Wolthusen, S. D., Theocharidou, M. & Rome, E. (eds.). Springer-Verlag, p. 199-210 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9578).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

Quantitative security metrics with human in the loop

Noureddine, M., Keefe, K., Sanders, W. H. & Bashir, M., Apr 21 2015, Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015. Association for Computing Machinery, 2746215. (ACM International Conference Proceeding Series; vol. 21-22-April-2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

AMI threats, intrusion detection requirements and deployment recommendations

Grochocki, D., Huh, J. H., Berthier, R., Bobba, R., Sanders, W. H., Cardenas, A. A. & Jetcheva, J. G., Dec 1 2012, 2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012. p. 395-400 6 p. 6486016. (2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

Data-driven model-based detection of malicious insiders via physical access logs

Cheh, C., Thakore, U., Fawaz, A., Chen, B., Temple, W. G. & Sanders, W. H., Nov 2019, In : ACM Transactions on Modeling and Computer Simulation. 29, 4, 26.

Research output: Contribution to journalArticle

2015

Security analysis of urban railway systems: The need for a cyber-physical perspective

Chen, B., Schmittner, C., Ma, Z., Temple, W. G., Dong, X., Jones, D. L. & Sanders, W. H., Jan 1 2015, Computer Safety, Reliability, and Security - AFECOMP 2015 Workshops ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Proceedings. van Gulijk, C. & Koornneef, F. (eds.). Springer-Verlag, p. 277-290 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9338).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

On train automatic stop control using balises: Attacks and a software-only countermeasure

Temple, W. G., Tran, B. A. N., Chen, B., Kalbarczyk, Z. T. & Sanders, W. H., May 5 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (eds.). IEEE Computer Society, p. 274-283 10 p. 7920632. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

A project to develop a trustworthy cyber infrastructure for the power grid (TCIPG)

Sauer, P. W. & Sanders, W. H., Dec 11 2012, 2012 IEEE Power and Energy Society General Meeting, PES 2012. 6345765. (IEEE Power and Energy Society General Meeting).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Workshop on open resilient human-aware cyber-physical systems

Kaaniche, M., Harrison, M., Kopetz, H., Siewiorek, D., Arlat, J., Bakken, D., Blough, D., Buss, M., Cao, J., Chen, Y. K., Deconinck, G., Jahanian, F., Gleizes, M. P., Iwano, K., Haddadi, H., Helal, S., Lee, I., Liu, J., Marzullo, K., Maxion, R. & 7 others, Obermaisser, R., Paulitsch, M., Powell, D., Roudier, Y., Rufino, J., Sanders, W. H. & Xia, F., 2012, 2012 IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops, DSN-W 2012. 6264650. (Proceedings of the International Conference on Dependable Systems and Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

A game-theoretic approach to respond to attacker lateral movement

Noureddine, M. A., Fawaz, A., Sanders, W. H. & Başar, T., Jan 1 2016, Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings. Panaousis, E., Tambe, M., Alpcan, T., Casey, W. & Zhu, Q. (eds.). Springer-Verlag, p. 294-313 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9996 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

FloGuard: Cost-aware systemwide intrusion defense via online forensics and on-demand IDS deployment

Zonouz, S. A., Joshi, K. R. & Sanders, W. H., Sep 26 2011, Computer Safety, Reliability, and Security - 30th International Conference, SAFECOMP 2011, Proceedings. p. 338-354 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6894 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

Learning from early attempts to measure information security performance

Zhang, J., Berthier, R., Rhee, W., Bailey, M., Pal, P., Jahanian, F. & Sanders, W. H., Jan 1 2012.

Research output: Contribution to conferencePaper

2019

Leveraging physical access logs to identify tailgating: Limitations and solutions

Cheh, C., Thakore, U., Chen, B., Temple, W. G. & Sanders, W. H., Sep 2019, Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019. Institute of Electrical and Electronics Engineers Inc., p. 127-132 6 p. 8893375. (Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

Automatic generation of security argument graphs

Tippenhauer, N. O., Temple, W. G., Vu, A. H., Chen, B., Nicol, D. M., Kalbarczyk, Z. & Sanders, W. H., Dec 3 2014, Proceedings - 20th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2014. IEEE Computer Society, p. 33-42 10 p. 6974749. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

An Efficient Strategy for Model Composition in the Möbius Modeling Environment

Masetti, G., Chiaradonna, S., Di Giandomenico, F., Feddersen, B. & Sanders, W. H., Nov 9 2018, Proceedings - 2018 14th European Dependable Computing Conference, EDCC 2018. Institute of Electrical and Electronics Engineers Inc., p. 116-119 4 p. 8530770. (Proceedings - 2018 14th European Dependable Computing Conference, EDCC 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

Formal design of communication checkers for ICCP using UPPAAL

Malik, S., Berthier, R., Bobba, R. B., Campbell, R. H. & Sanders, W. H., Dec 1 2013, 2013 IEEE International Conference on Smart Grid Communications, SmartGridComm 2013. p. 486-491 6 p. 6688005. (2013 IEEE International Conference on Smart Grid Communications, SmartGridComm 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An actor-centric, asset-based monitor deployment model for cloud computing

Thakore, U., Weaver, G. A. & Sanders, W. H., Jan 1 2013, Proceedings - 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, UCC 2013. IEEE Computer Society, p. 311-312 2 p. 6809423. (Proceedings - 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, UCC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Learning process behavioral baselines for anomaly detection

Fawaz, A. M. & Sanders, W. H., May 5 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (eds.). IEEE Computer Society, p. 145-154 10 p. 7920608. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

Smart grid protocol testing through cyber-physical testbeds

Yardley, T., Berthier, R., Nicol, D. & Sanders, W. H., May 6 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference, ISGT 2013. 6497837. (2013 IEEE PES Innovative Smart Grid Technologies Conference, ISGT 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

Model-based security metrics using ADversary VIew Security Evaluation (ADVISE)

LeMay, E., Ford, M. D., Keefe, K., Sanders, W. H. & Muehrcke, C., Nov 2 2011, Proceedings of the 2011 8th International Conference on Quantitative Evaluation of Systems, QEST 2011. p. 191-200 10 p. 6042046. (Proceedings of the 2011 8th International Conference on Quantitative Evaluation of Systems, QEST 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

A Response Cost Model for Advanced Metering Infrastructures

Fawaz, A., Berthier, R. & Sanders, W. H., Mar 2016, In : IEEE Transactions on Smart Grid. 7, 2, p. 543-553 11 p., 7114342.

Research output: Contribution to journalArticle

2018

Peer-to-peer Detection of DoS Attacks on City-Scale IoT Mesh Networks

Rausch, M. J., Krishna, V. B., Gu, P., Chandra, R., Feddersen, B., Fawaz, A. & Sanders, W. H., Dec 24 2018, 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018. Institute of Electrical and Electronics Engineers Inc., 8587518. (2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A provenance model for the european union general data protection regulation

Ujcich, B. E., Bates, A. & Sanders, W. H., Jan 1 2018, Provenance and Annotation of Data and Processes - 7th International Provenance and Annotation Workshop, IPAW 2018, Proceedings. Belhajjame, K., Gehani, A. & Alper, P. (eds.). Springer-Verlag Berlin Heidelberg, p. 45-57 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11017 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures

Zonouz, S., Rogers, K. M., Berthier, R., Bobba, R. B., Sanders, W. H. & Overbye, T. J., Dec 1 2012, In : IEEE Transactions on Smart Grid. 3, 4, p. 1790-1799 10 p., 6376274.

Research output: Contribution to journalArticle

Enhancing grid measurements

Bobbo, R. B., Dagle, J., Heine, E., Khurana, H., Sanders, W. H., Sauer, P. & Yardley, T., Jan 1 2012, In : IEEE Power and Energy Magazine. 10, 1, p. 67-73 7 p., 6102586.

Research output: Contribution to journalArticle

Cost modeling of response actions for automated response and recovery in AMI

Fawaz, A., Berthier, R. & Sanders, W. H., Dec 1 2012, 2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012. p. 348-353 6 p. 6486008. (2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Cyber-Physical Topology Language: Definition, Operations, and Application

Cheh, C., Weaver, G. A. & Sanders, W. H., Jan 4 2016, Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015. Xiang, D., Tsuchiya, T. & Wang, G. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 60-69 10 p. 7371417. (Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

SOCCA: A security-oriented cyber-physical contingency analysis in power infrastructures

Zonouz, S., Davis, C. M., Davis, K. R., Berthier, R., Bobba, R. B. & Sanders, W. H., Jan 1 2014, In : IEEE Transactions on Smart Grid. 5, 1, p. 3-13 11 p., 6687271.

Research output: Contribution to journalArticle

2013

PSCloud: A durable context-aware personal storage cloud

Bazarbayev, S., Hiltunen, M., Joshi, K., Sanders, W. H. & Schlichting, R., Jan 1 2013, Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, HotDep 2013. Association for Computing Machinery, (Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, HotDep 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Poster: Detecting monitor compromise using evidential reasoning

Thakore, U., Fawaz, A. & Sanders, W. H., Apr 10 2018, Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2018. Association for Computing Machinery, 3191693. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

PCA-based method for detecting integrity attacks on advanced metering infrastructure

Krishna, V. B., Weaver, G. A. & Sanders, W. H., Jan 1 2015, Quantitative Evaluation of Systems - 12th International Conference, QEST 2015, Proceedings. Campos, J. & Haverkort, B. R. (eds.). Springer-Verlag Berlin Heidelberg, p. 70-85 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9259).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

Modeling the fault tolerance consequences of deduplication

Rozier, E. W. D., Sanders, W. H., Zhou, P., Mandagere, N., Uttamchandani, S. M. & Yakushev, M. L., Dec 14 2011, Proceedings - 2011 30th IEEE International Symposium on Reliable Distributed Systems, SRDS 2011. p. 75-84 10 p. 6076764. (Proceedings of the IEEE Symposium on Reliable Distributed Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

Toward a cyber-physical topology language: Applications to NERC CIP audit

Weaver, G. A., Cheh, C., Rogers, E. J., Sanders, W. H. & Gammel, D., Dec 9 2013, SEGS 2013 - Proceedings of the 2013 ACM Workshop on Smart Energy Grid Security, Co-located with CCS 2013. p. 93-104 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

Quantitative security metrics: Unattainable holy grail or a vital breakthrough within our reach?

Sanders, W. H., 2014, In : IEEE Security and Privacy. 12, 2, p. 67-69 3 p., 6798561.

Research output: Contribution to journalArticle

2017

ATTAIN: An Attack Injection Framework for Software-Defined Networking

Ujcich, B. E., Thakore, U. & Sanders, W. H., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 567-578 12 p. 8023155. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

Data protection intents for software-defined networking

Ujcich, B. E. & Sanders, W. H., Jun 2019, Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019. Jacquenet, C., De Turck, F., Chemouil, P., Esposito, F., Festor, O., Cerroni, W. & Secci, S. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 271-275 5 p. 8806684. (Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

Implementing the ADVISE security modeling formalism in Möbius

Ford, M. D., Keefe, K., Lemay, E., Sanders, W. H. & Muehrcke, C., Sep 9 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2013. 6575362. (Proceedings of the International Conference on Dependable Systems and Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution