default search action
Sean Peisert
Person information
- affiliation: Lawrence Berkeley National Laboratory, CA, USA
- affiliation: University of California, Davis, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon:
Optimum noise mechanism for differentially private queries in discrete finite sets. Cybersecur. 7(1): 54 (2024) - [c48]Hang Liu, Anna Scaglione, Sean Peisert:
Privacy Leakage In Graph Signal To Graph Matching Problems. ICASSP 2024: 9371-9375 - [i20]Nikhil Ravi, Anna Scaglione, Sean Peisert, Parth Pradhan:
Differentially Private Communication of Measurement Anomalies in the Smart Grid. CoRR abs/2403.02324 (2024) - 2023
- [j34]Sean Peisert:
The First 20 Years of IEEE Security & Privacy. IEEE Secur. Priv. 21(2): 4-6 (2023) - [j33]Sean Peisert:
On Software Infrastructure: Develop, Prove, Profit? IEEE Secur. Priv. 21(4): 4-8 (2023) - [j32]Raksha Ramakrishna, Anna Scaglione, Tong Wu, Nikhil Ravi, Sean Peisert:
Differential Privacy for Class-Based Data: A Practical Gaussian Mechanism. IEEE Trans. Inf. Forensics Secur. 18: 5096-5108 (2023) - [c47]Tong Wu, Anna Scaglione, Adrian Petru Surani, Daniel B. Arnold, Sean Peisert:
Network-Constrained Reinforcement Learning for Optimal EV Charging Control. SmartGridComm 2023: 1-6 - [c46]Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon:
Optimum Noise Mechanism for Probabilistic Differentially Private Queries in Discrete Finite Sets. SmartNets 2023: 1-6 - [i19]Nikhil Ravi, Anna Scaglione, Julieta Giraldez, Parth Pradhan, Chuck Moran, Sean Peisert:
Solar Photovoltaic Systems Metadata Inference and Differentially Private Publication. CoRR abs/2304.03749 (2023) - [i18]Raksha Ramakrishna, Anna Scaglione, Tong Wu, Nikhil Ravi, Sean Peisert:
Differential Privacy for Class-based Data: A Practical Gaussian Mechanism. CoRR abs/2306.05578 (2023) - 2022
- [j31]Sean Peisert:
Unsafe at Any Clock Speed: The Insecurity of Computer System Design, Implementation, and Operation. IEEE Secur. Priv. 20(1): 4-9 (2022) - [j30]Nikhil Ravi, Anna Scaglione, Sachin Kadam, Reinhard Gentz, Sean Peisert, Brent Lunghino, Emmanuel Levijarvi, Aram Shumavon:
Differentially Private -Means Clustering Applied to Meter Data Analysis and Synthesis. IEEE Trans. Smart Grid 13(6): 4801-4814 (2022) - [c45]Ammar Haydari, Chen-Nee Chuah, H. Michael Zhang, Jane MacFarlane, Sean Peisert:
Differentially Private Map Matching for Mobility Trajectories. ACSAC 2022: 293-303 - [c44]Daniel Arnold, Sy-Toan Ngo, Ciaran M. Roberts, Yize Chen, Anna Scaglione, Sean Peisert:
Adam-based Augmented Random Search for Control Policies for Distributed Energy Resource Cyber Attack Mitigation. ACC 2022: 4559-4566 - [c43]Ayaz Akram, Venkatesh Akella, Sean Peisert, Jason Lowe-Power:
SoK: Limitations of Confidential Computing via TEEs for High-Performance Compute Systems. SEED 2022: 121-132 - [i17]Daniel B. Arnold, Sy-Toan Ngo, Ciaran M. Roberts, Yize Chen, Anna Scaglione, Sean Peisert:
Adam-based Augmented Random Search for Control Policies for Distributed Energy Resource Cyber Attack Mitigation. CoRR abs/2201.11825 (2022) - [i16]Daniel B. Arnold, Shammya Saha, Sy-Toan Ngo, Ciaran M. Roberts, Anna Scaglione, Nathan G. Johnson, Sean Peisert, David Pinney:
Adaptive Control of Distributed Energy Resources for Distribution Grid Voltage Stability. CoRR abs/2202.05373 (2022) - 2021
- [j29]Sean Peisert:
Trustworthy scientific computing. Commun. ACM 64(5): 18-21 (2021) - [j28]Sean Peisert:
Reflections on the Past, Perspectives on the Future [From the Editors]. IEEE Secur. Priv. 19(1): 4-7 (2021) - [j27]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - [j26]Fabio Massacci, Trent Jaeger, Sean Peisert:
SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil? IEEE Secur. Priv. 19(2): 14-19 (2021) - [c42]Ciaran M. Roberts, Sy-Toan Ngo, Alexandre Milesi, Anna Scaglione, Sean Peisert, Daniel B. Arnold:
Deep Reinforcement Learning for Mitigating Cyber-Physical DER Voltage Unbalance Attacks. ACC 2021: 2861-2867 - [c41]James R. Clavin, Yue Huang, Xin Wang, Pradeep M. Prakash, Sisi Duan, Jianwu Wang, Sean Peisert:
A Framework for Evaluating BFT. ICPADS 2021: 193-200 - [c40]Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert:
Performance Analysis of Scientific Computing Workloads on General Purpose TEEs. IPDPS 2021: 1066-1076 - [i15]Yize Chen, Daniel B. Arnold, Yuanyuan Shi, Sean Peisert:
Understanding the Safety Requirements for Learning-based Power Systems Operations. CoRR abs/2110.04983 (2021) - [i14]Nikhil Ravi, Anna Scaglione, Sean Peisert:
Colored Noise Mechanism for Differentially Private Clustering. CoRR abs/2111.07850 (2021) - [i13]Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon:
Optimum Noise Mechanism for Differentially Private Queries in Discrete Finite Sets. CoRR abs/2111.11661 (2021) - [i12]Luca Pion-Tonachini, Kristofer E. Bouchard, Héctor García Martín, Sean Peisert, W. Bradley Holtz, Anil Aswani, Dipankar Dwivedi, Haruko M. Wainwright, Ghanshyam Pilania, Benjamin Nachman, Babetta L. Marrone, Nicola Falco, Prabhat, Daniel B. Arnold, Alejandro Wolf-Yadlin, Sarah Powers, Sharlee Climer, Quinn Jackson, Ty Carlson, Michael Sohn, Petrus H. Zwart, Neeraj Kumar, Amy Justice, Claire J. Tomlin, Daniel A. Jacobson, Gos Micklem, Georgios V. Gkoutos, Peter J. Bickel, Jean-Baptiste Cazier, Juliane Müller, Bobbie-Jo Webb-Robertson, Rick Stevens, Mark Anderson, Kenneth Kreutz-Delgado, Michael W. Mahoney, James B. Brown:
Learning from learning machines: a new generation of AI technology to meet the needs of science. CoRR abs/2111.13786 (2021) - [i11]Yize Chen, Yuanyuan Shi, Daniel B. Arnold, Sean Peisert:
SAVER: Safe Learning-Based Controller for Real-Time Voltage Regulation. CoRR abs/2111.15152 (2021) - [i10]Ammar Haydari, H. Michael Zhang, Chen-Nee Chuah, Jane MacFarlane, Sean Peisert:
Adaptive Differential Privacy Mechanism for Aggregated Mobility Dataset. CoRR abs/2112.08487 (2021) - 2020
- [j25]Anna Giannakou, Dipankar Dwivedi, Sean Peisert:
A machine learning approach for packet loss prediction in science flows. Future Gener. Comput. Syst. 102: 190-197 (2020) - [j24]Sean Peisert:
Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19. IEEE Secur. Priv. 18(4): 4-7 (2020) - [j23]Mahdi Jamei, Raksha Ramakrishna, Teklemariam Tesfay, Reinhard Gentz, Ciaran M. Roberts, Anna Scaglione, Sean Peisert:
Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization. IEEE J. Sel. Areas Commun. 38(1): 180-192 (2020) - [j22]Ciaran M. Roberts, Anna Scaglione, Mahdi Jamei, Reinhard Gentz, Sean Peisert, Emma M. Stewart, Chuck McParland, Alex McEachern, Daniel B. Arnold:
Learning Behavior of Distribution System Discrete Control Devices for Cyber-Physical Security. IEEE Trans. Smart Grid 11(1): 749-761 (2020) - [c39]Ross K. Gegan, Christina Mao, Dipak Ghosal, Matt Bishop, Sean Peisert:
Anomaly Detection for Science DMZs Using System Performance Data. ICNC 2020: 492-496 - [c38]Ignacio Losada Carreno, Raksha Ramakrishna, Anna Scaglione, Daniel B. Arnold, Ciaran M. Roberts, Sy-Toan Ngo, Sean Peisert, David Pinney:
SoDa: An Irradiance-Based Synthetic Solar Data Generation Tool. SmartGridComm 2020: 1-6 - [c37]Ciaran M. Roberts, Sy-Toan Ngo, Alexandre Milesi, Sean Peisert, Daniel B. Arnold, Shammya Saha, Anna Scaglione, Nathan G. Johnson, Anton Kocheturov, Dmitriy Fradkin:
Deep Reinforcement Learning for DER Cyber-Attack Mitigation. SmartGridComm 2020: 1-7 - [i9]Bogdan Copos, Sean Peisert:
Catch Me If You Can: Using Power Analysis to Identify HPC Activity. CoRR abs/2005.03135 (2020) - [i8]Ciaran M. Roberts, Sy-Toan Ngo, Alexandre Milesi, Sean Peisert, Daniel B. Arnold, Shammya Saha, Anna Scaglione, Nathan G. Johnson, Anton Kocheturov, Dmitriy Fradkin:
Deep Reinforcement Learning for DER Cyber-Attack Mitigation. CoRR abs/2009.13088 (2020) - [i7]Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert:
Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments. CoRR abs/2010.13216 (2020) - [i6]Shammya Shananda Saha, Daniel Arnold, Anna Scaglione, Eran Schweitzer, Ciaran M. Roberts, Sean Peisert, Nathan G. Johnson:
Lyapunov Stability of Smart Inverters Using Linearized DistFlow Approximation. CoRR abs/2011.09620 (2020)
2010 – 2019
- 2019
- [j21]Sean Peisert:
Some Experiences in Developing Security Technology That Actually Get Used. IEEE Secur. Priv. 17(2): 4-7 (2019) - [j20]Melissa Stockman, Dipankar Dwivedi, Reinhard Gentz, Sean Peisert:
Detecting control system misbehavior by fingerprinting programmable logic controller functionality. Int. J. Crit. Infrastructure Prot. 26 (2019) - [c36]Reinhard Gentz, Sean Peisert, Joshua Boverhof, Daniel Gunter:
SPARCS: Stream-Processing Architecture Applied in Real-Time Cyber-Physical Security. eScience 2019: 199-202 - [c35]Reinhard Gentz, Héctor García Martín, Edward Baidoo, Sean Peisert:
Workflow Automation in Liquid Chromatography Mass Spectrometry. eScience 2019: 638-639 - [c34]Amir Teshome Wonjiga, Sean Peisert, Louis Rilling, Christine Morin:
Blockchain as a Trusted Component in Cloud SLA Verification. UCC Companion 2019: 93-100 - [c33]Andrew K. Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence D. Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert, Scott Russell, Susan Sons, Von Welch, John Zage:
Trusted CI Experiences in Cybersecurity and Service to Open Science. PEARC 2019: 60 - [i5]Andrew K. Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence D. Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert, Scott Russell, Susan Sons, Von Welch, John Zage:
Trusted CI Experiences in Cybersecurity and Service to Open Science. CoRR abs/1904.05383 (2019) - 2018
- [j19]Terry Benzel, Sean Peisert:
Selected Papers from the 2017 IEEE Symposium on Security and Privacy. IEEE Secur. Priv. 16(1): 10-11 (2018) - [j18]Sean Peisert, Eli Dart, William Barnett, Edward Balas, James Cuff, Robert L. Grossman, Ari Berman, Anurag Shankar, Brian Tierney:
The medical science DMZ: a network design pattern for data-intensive medical science. J. Am. Medical Informatics Assoc. 25(3): 267-274 (2018) - [c32]Anna Giannakou, Daniel Gunter, Sean Peisert:
Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. INDIS@SC 2018: 1-9 - [c31]Mahdi Jamei, Anna Scaglione, Sean Peisert:
Low-Resolution Fault Localization Using Phasor Measurement Units with Community Detection. SmartGridComm 2018: 1-6 - [i4]Mahdi Jamei, Anna Scaglione, Sean Peisert:
Low-Resolution Fault Localization Using Phasor Measurement Units with Community Detection. CoRR abs/1809.04014 (2018) - 2017
- [j17]Sean Peisert:
Security in high-performance computing environments. Commun. ACM 60(9): 72-80 (2017) - [j16]Sean Peisert, Von Welch:
The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity. IEEE Secur. Priv. 15(5): 94-95 (2017) - [j15]Leon J. Osterweil, Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, Sean Peisert:
Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example. ACM Trans. Priv. Secur. 20(2): 5:1-5:31 (2017) - [c30]Alberto Gonzalez, Jason Leigh, Sean Peisert, Brian Tierney, Edward Balas, Predrag Radulovic, Jennifer M. Schopf:
Big Data and Analysis of Data Transfers for International Research Networks Using NetSage. BigData Congress 2017: 344-351 - [c29]Mahdi Jamei, Anna Scaglione, Ciaran M. Roberts, Emma M. Stewart, Sean Peisert, Chuck McParland, Alex McEachern:
Automated Anomaly Detection in Distribution Grids Using uPMU Measurements. HICSS 2017: 1-10 - [c28]Sean Peisert, Matt Bishop, Edward B. Talbot:
A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing. NSPW 2017: 80-89 - [c27]Jonathan Ganz, Sean Peisert:
ASLR: How Robust Is the Randomness? SecDev 2017: 34-41 - [c26]Emma M. Stewart, Philip Top, Michael Chertkov, Deepjyoti Deka, Scott Backhaus, Andrey Y. Lokhov, Ciaran M. Roberts, Val Hendrix, Sean Peisert, Anthony Florita, Thomas J. King, Matthew J. Reno:
Integrated multi-scale data analytics and machine learning for the distribution grid. SmartGridComm 2017: 423-429 - [i3]Mahdi Jamei, Anna Scaglione, Ciaran M. Roberts, Emma M. Stewart, Sean Peisert, Chuck McParland, Alex McEachern:
Anomaly Detection Using Optimally-Placed Micro-PMU Sensors in Distribution Grids. CoRR abs/1708.00118 (2017) - 2016
- [j14]Mahdi Jamei, Emma M. Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran M. Roberts, Alex McEachern:
Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Toward Critical Infrastructure Security. IEEE Internet Comput. 20(5): 18-27 (2016) - [j13]Sean Peisert, William Barnett, Eli Dart, James Cuff, Robert L. Grossman, Edward B. Talbot, Ari Berman, Anurag Shankar, Brian Tierney:
The Medical Science DMZ. J. Am. Medical Informatics Assoc. 23(6): 1199-1201 (2016) - [i2]Mahdi Jamei, Anna Scaglione, Ciaran M. Roberts, Emma M. Stewart, Sean Peisert, Chuck McParland, Alex McEachern:
Automated Anomaly Detection in Distribution Grids Using μPMU Measurements. CoRR abs/1610.01107 (2016) - 2015
- [j12]Sisi Duan, Sean Peisert, Karl N. Levitt:
hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost. IEEE Trans. Dependable Secur. Comput. 12(1): 58-70 (2015) - [c25]Georgia Koutsandria, Reinhard Gentz, Mahdi Jamei, Anna Scaglione, Sean Peisert, Chuck McParland:
A Real-Time Testbed Environment for Cyber-Physical Security on the Power Grid. CPS-SPC@CCS 2015: 67-78 - [c24]Adrian R. Chavez, William M. S. Stout, Sean Peisert:
Techniques for the dynamic randomization of network attributes. ICCST 2015: 1-6 - [c23]Sisi Duan, Jingtao Sun, Sean Peisert:
Towards a Self-Adaptive Middleware for Building Reliable Publish/Subscribe Systems. IDCS 2015: 157-168 - 2014
- [j11]Peter G. Neumann, Sean Peisert, Marvin Schaefer:
The IEEE Symposium on Security and Privacy, in Retrospect. IEEE Secur. Priv. 12(3): 15-17 (2014) - [j10]Sean Peisert, Jonathan Margulies, David M. Nicol, Himanshu Khurana, Chris Sawall:
Designed-in Security for Cyber-Physical Systems. IEEE Secur. Priv. 12(5): 9-12 (2014) - [j9]Sean Peisert, Jonathan Margulies:
Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction]. IEEE Secur. Priv. 12(6): 13-14 (2014) - [j8]Chuck McParland, Sean Peisert, Anna Scaglione:
Monitoring Security of Networked Control Systems: It's the Physics. IEEE Secur. Priv. 12(6): 32-39 (2014) - [j7]Sean Peisert, Jonathan Margulies, Eric Byres, Paul Dorey, Dale Peterson, Zach Tudor:
Control Systems Security from the Front Lines. IEEE Secur. Priv. 12(6): 55-58 (2014) - [c22]Tiancheng Chang, Sisi Duan, Hein Meling, Sean Peisert, Haibin Zhang:
P2S: a fault-tolerant publish/subscribe infrastructure. DEBS 2014: 189-197 - [c21]Masood Parvania, Georgia Koutsandria, Vishak Muthukumar, Sean Peisert, Chuck McParland, Anna Scaglione:
Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems. DSN 2014: 774-779 - [c20]Sisi Duan, Hein Meling, Sean Peisert, Haibin Zhang:
BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration. OPODIS 2014: 91-106 - [c19]Georgia Koutsandria, Vishak Muthukumar, Masood Parvania, Sean Peisert, Chuck McParland, Anna Scaglione:
A hybrid network IDS for protective digital relays in the power transmission grid. SmartGridComm 2014: 908-913 - [c18]Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, Leon J. Osterweil, Sean Peisert:
Insider Threat Identification by Process Analysis. IEEE Symposium on Security and Privacy Workshops 2014: 251-264 - [c17]Sisi Duan, Karl N. Levitt, Hein Meling, Sean Peisert, Haibin Zhang:
ByzID: Byzantine Fault Tolerance from Intrusion Detection. SRDS 2014: 253-264 - 2013
- [j6]Sean Whalen, Sean Peisert, Matt Bishop:
Multiclass classification of distributed memory parallel computations. Pattern Recognit. Lett. 34(3): 322-329 (2013) - [c16]Sean Peisert, Edward B. Talbot, Tom M. Kroeger:
Principles of authentication. NSPW 2013: 47-56 - 2012
- [j5]Matt Bishop, Sean Peisert:
Security and Elections. IEEE Secur. Priv. 10(5): 64-67 (2012) - [j4]Sean Whalen, Sophie Engle, Sean Peisert, Matt Bishop:
Network-theoretic classification of parallel computation patterns. Int. J. High Perform. Comput. Appl. 26(2): 159-169 (2012) - [c15]Zhifang Wang, Xiao Li, Vishak Muthukumar, Anna Scaglione, Sean Peisert, Chuck McParland:
Networked loads in the distribution grid. APSIPA 2012: 1-7 - [c14]Sean Peisert, Edward B. Talbot, Matt Bishop:
Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems. NSPW 2012: 15-26 - [e4]Sean Peisert, Stephen Schwab:
5th Workshop on Cyber Security Experimentation and Test, CSET '12, Bellevue, WA, USA, August 6, 2012. USENIX Association 2012 [contents] - [i1]Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert, Christian W. Probst:
Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501). Dagstuhl Reports 2(12): 37-48 (2012) - 2011
- [e3]Sean Peisert, Richard Ford, Carrie Gates, Cormac Herley:
2011 New Security Paradigms Workshop, NSPW '11, Marin County, CA, USA, September 12-15, 2011. ACM 2011, ISBN 978-1-4503-1078-9 [contents] - [e2]Sean Peisert, Stephen Schwab:
4th Workshop on Cyber Security Experimentation and Test, CSET '11, San Francisco, CA, USA, August 8, 2011. USENIX Association 2011 [contents] - 2010
- [c13]Matt Bishop, Justin Cummins, Sean Peisert, Anhad Singh, Bhume Bhumiratana, Deborah A. Agarwal, Deborah A. Frincke, Michael A. Hogarth:
Relationships and data sanitization: a study in scarlet. NSPW 2010: 151-164 - [c12]Peter G. Neumann, Matt Bishop, Sean Peisert, Marv Schaefer:
Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. IEEE Symposium on Security and Privacy 2010: 3-13 - [c11]Borislava I. Simidchieva, Sophie Engle, Michael Clifford, Alicia Clay Jones, Sean Peisert, Matt Bishop, Lori A. Clarke, Leon J. Osterweil:
Modeling and Analyzing Faults to Improve Election Process Robustness. EVT/WOTE 2010 - [p1]Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen:
A Risk Management Approach to the "Insider Threat". Insider Threats in Cyber Security 2010: 115-137 - [e1]Angelos D. Keromytis, Sean Peisert, Richard Ford, Carrie Gates:
Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010. ACM 2010, ISBN 978-1-4503-0415-3 [contents]
2000 – 2009
- 2009
- [c10]Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates:
Case Studies of an Insider Framework. HICSS 2009: 1-10 - [c9]Sean Peisert, Matt Bishop, Alec Yasinsac:
Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines. HICSS 2009: 1-10 - [c8]Sean Peisert, Matt Bishop, Laura Corriss, Steven J. Greenwald:
Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet Juvenal. NSPW 2009: 71-84 - [c7]Jean West, Ulf Lindqvist, Peter J. Vasquez, Michael Losavio, Sean Peisert:
Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure Security. SADFE 2009: 97-98 - [c6]Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff:
E-Voting and Forensics: Prying Open the Black Box. EVT/WOTE 2009 - 2008
- [c5]Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates:
We have met the enemy and he is us. NSPW 2008: 1-12 - [c4]Sean Peisert, Matt Bishop, Keith Marzullo:
Computer Forensics in Forensis. SADFE 2008: 102-122 - 2007
- [b1]Sean Peisert:
A model of forensic analysis using goal-oriented logging. University of California, San Diego, USA, 2007 - [j3]Sean Peisert, Matt Bishop:
I Am a Scientist, Not a Philosopher! IEEE Secur. Priv. 5(4): 48-51 (2007) - [j2]Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo:
Analysis of Computer Intrusions Using Sequences of Function Calls. IEEE Trans. Dependable Secur. Comput. 4(2): 137-150 (2007) - [c3]Sean Peisert, Matt Bishop:
How to Design Computer Security Experiments. World Conference on Information Security Education 2007: 141-148 - [c2]Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo:
Toward Models for Forensic Analysis. SADFE 2007: 3-15 - 2005
- [j1]Sean Peisert:
Forensics for System Administrators. login Usenix Mag. 30(4) (2005) - [c1]Sean Peisert, Sidney Karin, Matt Bishop, Keith Marzullo:
Principles-driven forensic analysis. NSPW 2005: 85-93
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint