default search action
William H. Sanders
Person information
- affiliation: University of Illinois, Urbana-Champain, IL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j60]William G. Temple, Yue Wu, Carmen Cheh, Yuan Li, Binbin Chen, Zbigniew T. Kalbarczyk, William H. Sanders, David M. Nicol:
CyberSAGE: The cyber security argument graph evaluation tool. Empir. Softw. Eng. 28(1): 18 (2023) - 2021
- [j59]Giulio Masetti, Silvano Chiaradonna, Felicita Di Giandomenico, William H. Sanders, Brett Feddersen:
Extending the Möbius Modeling Environment with the Advanced Replication Operator. SIGMETRICS Perform. Evaluation Rev. 48(4): 62-67 (2021) - [c186]Michael J. Rausch, William H. Sanders:
Evaluating the Effectiveness of Metamodeling in Emulating Quantitative Models. QEST 2021: 127-145 - [c185]Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Adam Bates, William H. Sanders, Hamed Okhravi:
Causal Analysis for Software-Defined Networking Attacks. USENIX Security Symposium 2021: 3183-3200 - 2020
- [j58]Carmen Cheh, Binbin Chen, William G. Temple, William H. Sanders:
Modeling Adversarial Physical Movement in a Railway Station: Classification and Metrics. ACM Trans. Cyber Phys. Syst. 4(1): 11:1-11:25 (2020) - [c184]Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Steven R. Gomez, Adam Bates, William H. Sanders, Hamed Okhravi:
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking. NDSS 2020 - [c183]Benjamin E. Ujcich, Adam Bates, William H. Sanders:
Provenance for Intent-Based Networking. NetSoft 2020: 195-199 - [c182]Michael J. Rausch, William H. Sanders:
Sensitivity Analysis and Uncertainty Quantification of State-Based Discrete-Event Simulation Models Through a Stacked Ensemble of Metamodels. QEST 2020: 276-293 - [c181]Atul Bohara, Jordi Ros-Giralt, Ghada Elbez, Alfonso Valdes, Klara Nahrstedt, William H. Sanders:
ED4GAP: Efficient Detection for GOOSE-Based Poisoning Attacks on IEC 61850 Substations. SmartGridComm 2020: 1-7 - [c180]Michael J. Rausch, William H. Sanders:
Stacked Metamodels for Sensitivity Analysis and Uncertainty Quantification of AMI Models. SmartGridComm 2020: 1-7
2010 – 2019
- 2019
- [j57]Carmen Cheh, Uttam Thakore, Ahmed M. Fawaz, Binbin Chen, William G. Temple, William H. Sanders:
Data-driven Model-based Detection of Malicious Insiders via Physical Access Logs. ACM Trans. Model. Comput. Simul. 29(4): 26:1-26:25 (2019) - [c179]Mohammad A. Noureddine, Amanda Hsu, Matthew Caesar, Fadi A. Zaraket, William H. Sanders:
P4AIG: Circuit-Level Verification of P4 Programs. DSN (Supplements) 2019: 21-22 - [c178]Mohammad A. Noureddine, Ahmed M. Fawaz, Amanda Hsu, Cody Guldner, Sameer Vijay, Tamer Basar, William H. Sanders:
Revisiting Client Puzzles for State Exhaustion Attacks Resilience. DSN 2019: 617-629 - [c177]Carmen Cheh, Uttam Thakore, Binbin Chen, William G. Temple, William H. Sanders:
Leveraging Physical Access Logs to Identify Tailgating: Limitations and Solutions. EDCC 2019: 127-132 - [c176]Uttam Thakore, Harigovind V. Ramasamy, William H. Sanders:
Coordinated Analysis of Heterogeneous Monitor Data in Enterprise Clouds for Incident Response. ISSRE Workshops 2019: 53-58 - [c175]Benjamin E. Ujcich, William H. Sanders:
Data Protection Intents for Software-Defined Networking. NetSoft 2019: 271-275 - 2018
- [j56]Varun Badrinath Krishna, Ziping Wu, Vaidehi V. Ambardekar, Richard Macwan, William H. Sanders:
Cyberattacks on Primary Frequency Response Mechanisms in Power Grids. Computer 51(11): 37-45 (2018) - [j55]Varun Badrinath Krishna, Carl A. Gunter, William H. Sanders:
Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud. IEEE J. Sel. Top. Signal Process. 12(4): 790-805 (2018) - [c174]Benjamin E. Ujcich, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi:
Cross-App Poisoning in Software-Defined Networking. CCS 2018: 648-663 - [c173]Ahmed M. Fawaz, Mohammad A. Noureddine, William H. Sanders:
POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy. DSN 2018: 514-525 - [c172]Giulio Masetti, Silvano Chiaradonna, Felicita Di Giandomenico, Brett Feddersen, William H. Sanders:
An Efficient Strategy for Model Composition in the Möbius Modeling Environment. EDCC 2018: 116-119 - [c171]Ken Keefe, Brett Feddersen, Michael J. Rausch, Ronald Joseph Wright, William H. Sanders:
An Ontology Framework for Generating Discrete-Event Stochastic Models. EPEW 2018: 173-189 - [c170]Uttam Thakore, Ahmed M. Fawaz, William H. Sanders:
Detecting monitor compromise using evidential reasoning: poster. HotSoS 2018: 16:1 - [c169]Benjamin E. Ujcich, Adam Bates, William H. Sanders:
A Provenance Model for the European Union General Data Protection Regulation. IPAW 2018: 45-57 - [c168]Carmen Cheh, Ahmed M. Fawaz, Mohammad A. Noureddine, Binbin Chen, William G. Temple, William H. Sanders:
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems. PRDC 2018: 125-134 - [c167]Michael J. Rausch, Ahmed M. Fawaz, Ken Keefe, William H. Sanders:
Modeling Humans: A General Agent Model for the Evaluation of Security. QEST 2018: 373-388 - [c166]Michael J. Rausch, Varun Badrinath Krishna, Peng Gu, Rupak Chandra, Brett Feddersen, Ahmed M. Fawaz, William H. Sanders:
Peer-to-peer Detection of DoS Attacks on City-Scale IoT Mesh Networks. SmartGridComm 2018: 1-6 - [i4]Mohammad A. Noureddine, Ahmed M. Fawaz, Tamer Basar, William H. Sanders:
Revisiting Client Puzzles for State Exhaustion Attacks Resilience. CoRR abs/1807.11892 (2018) - 2017
- [c165]Carmen Cheh, Ken Keefe, Brett Feddersen, Binbin Chen, William G. Temple, William H. Sanders:
Developing Models for Physical Attacks in Cyber-Physical Systems. CPS-SPC@CCS 2017: 49-55 - [c164]Michael J. Rausch, Ken Keefe, Brett Feddersen, William H. Sanders:
Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options. CRITIS 2017: 156-167 - [c163]Varun Badrinath Krishna, Michael J. Rausch, Benjamin E. Ujcich, Indranil Gupta, William H. Sanders:
REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks. DSN 2017: 321-332 - [c162]Benjamin E. Ujcich, Uttam Thakore, William H. Sanders:
ATTAIN: An Attack Injection Framework for Software-Defined Networking. DSN 2017: 567-578 - [c161]Ahmed M. Fawaz, William H. Sanders:
Learning Process Behavioral Baselines for Anomaly Detection. PRDC 2017: 145-154 - [c160]William G. Temple, Bao Anh N. Tran, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders:
On Train Automatic Stop Control Using Balises: Attacks and a Software-Only Countermeasure. PRDC 2017: 274-283 - [c159]Mohammad A. Noureddine, Andrew Marturano, Ken Keefe, Masooda N. Bashir, William H. Sanders:
Accounting for the Human User in Predictive Security Models. PRDC 2017: 329-338 - [c158]Carmen Cheh, Binbin Chen, William G. Temple, William H. Sanders:
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs. QEST 2017: 275-291 - [c157]Atul Bohara, Mohammad A. Noureddine, Ahmed M. Fawaz, William H. Sanders:
An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement. SRDS 2017: 224-233 - [i3]Ahmed M. Fawaz, Mohammad A. Noureddine, William H. Sanders:
PowerAlert: An Integrity Checker using Power Measurement. CoRR abs/1702.02907 (2017) - 2016
- [j54]Ken Keefe, William H. Sanders:
Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool. EAI Endorsed Trans. Security Safety 3(10): e3 (2016) - [j53]Ahmed M. Fawaz, Robin Berthier, William H. Sanders:
A Response Cost Model for Advanced Metering Infrastructures. IEEE Trans. Smart Grid 7(2): 543-553 (2016) - [c156]Ronald Joseph Wright, Ken Keefe, Brett Feddersen, William H. Sanders:
A Case Study Assessing the Effects of Cyber Attacks on a River Zonal Dispatcher. CRITIS 2016: 252-264 - [c155]Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer, David M. Nicol:
The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment. GraMSec@CSF 2016: 39-61 - [c154]Uttam Thakore, Gabriel A. Weaver, William H. Sanders:
A Quantitative Methodology for Security Monitor Deployment. DSN 2016: 1-12 - [c153]Varun Badrinath Krishna, Kiryung Lee, Gabriel A. Weaver, Ravishankar K. Iyer, William H. Sanders:
F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids. DSN 2016: 407-418 - [c152]Mohammad A. Noureddine, Ahmed M. Fawaz, William H. Sanders, Tamer Basar:
A Game-Theoretic Approach to Respond to Attacker Lateral Movement. GameSec 2016: 294-313 - [c151]Atul Bohara, Uttam Thakore, William H. Sanders:
Intrusion detection in enterprise systems by combining and clustering diverse monitor data. HotSoS 2016: 7-16 - [c150]Michael J. Rausch, Brett Feddersen, Ken Keefe, William H. Sanders:
A Comparison of Different Intrusion Detection Approaches in an Advanced Metering Infrastructure Network Using ADVISE. QEST 2016: 279-294 - [c149]Ahmed M. Fawaz, Atul Bohara, Carmen Cheh, William H. Sanders:
Lateral Movement Detection Using Distributed Data Fusion. SRDS 2016: 21-30 - 2015
- [j52]Saman A. Zonouz, Robin Berthier, Himanshu Khurana, William H. Sanders, Tim Yardley:
Seclius: An Information Flow-Based, Consequence-Centric Security Metric. IEEE Trans. Parallel Distributed Syst. 26(2): 562-573 (2015) - [c148]Varun Badrinath Krishna, Ravishankar K. Iyer, William H. Sanders:
ARIMA-Based Modeling and Validation of Consumption Readings in Power Grids. CRITIS 2015: 199-210 - [c147]Mohammad A. Noureddine, Ken Keefe, William H. Sanders, Masooda N. Bashir:
Quantitative security metrics with human in the loop. HotSoS 2015: 21:1-21:2 - [c146]Carmen Cheh, Gabriel A. Weaver, William H. Sanders:
Cyber-Physical Topology Language: Definition, Operations, and Application. PRDC 2015: 60-69 - [c145]Sumeet Jauhar, Binbin Chen, William G. Temple, Xinshu Dong, Zbigniew T. Kalbarczyk, William H. Sanders, David M. Nicol:
Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios. PRDC 2015: 319-324 - [c144]Varun Badrinath Krishna, Gabriel A. Weaver, William H. Sanders:
PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure. QEST 2015: 70-85 - [c143]Binbin Chen, Christoph Schmittner, Zhendong Ma, William G. Temple, Xinshu Dong, Douglas L. Jones, William H. Sanders:
Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective. SAFECOMP Workshops 2015: 277-290 - 2014
- [j51]William H. Sanders:
Quantitative Security Metrics: Unattainable Holy Grail or a Vital Breakthrough within Our Reach? IEEE Secur. Priv. 12(2): 67-69 (2014) - [j50]Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley:
RRE: A Game-Theoretic Intrusion Response and Recovery Engine. IEEE Trans. Parallel Distributed Syst. 25(2): 395-406 (2014) - [j49]Saman A. Zonouz, Charles M. Davis, Katherine R. Davis, Robin Berthier, Rakesh B. Bobba, William H. Sanders:
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures. IEEE Trans. Smart Grid 5(1): 3-13 (2014) - [j48]Alvaro A. Cárdenas, Robin Berthier, Rakesh B. Bobba, Jun Ho Huh, Jorjeta G. Jetcheva, David Grochocki, William H. Sanders:
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures. IEEE Trans. Smart Grid 5(2): 906-915 (2014) - [c142]Alefiya Hussain, Ted Faber, Robert Braden, Terry V. Benzel, Tim Yardley, Jeremy Jones, David M. Nicol, William H. Sanders, Thomas W. Edgar, Thomas E. Carroll, David O. Manz, Laura Tinnel:
Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems. DCOSS 2014: 358-360 - [c141]Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders:
Automatic Generation of Security Argument Graphs. PRDC 2014: 33-42 - [e3]Gethin Norman, William H. Sanders:
Quantitative Evaluation of Systems - 11th International Conference, QEST 2014, Florence, Italy, September 8-10, 2014. Proceedings. Lecture Notes in Computer Science 8657, Springer 2014, ISBN 978-3-319-10695-3 [contents] - [i2]Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders:
Automatic Generation of Security Argument Graphs. CoRR abs/1405.7475 (2014) - [i1]Erika Ábrahám, Alberto Avritzer, Anne Remke, William H. Sanders:
Randomized Timed and Hybrid Models for Critical Infrastructures (Dagstuhl Seminar 14031). Dagstuhl Reports 4(1): 36-82 (2014) - 2013
- [j47]Saman A. Zonouz, Amir Houmansadr, Robin Berthier, Nikita Borisov, William H. Sanders:
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Comput. Secur. 37: 215-227 (2013) - [c140]Gabriel A. Weaver, Carmen Cheh, Edmond Rogers, William H. Sanders, Dennis Gammel:
Toward a cyber-physical topology language: applications to NERC CIP audit. SEGS@CCS 2013: 93-104 - [c139]Michael D. Ford, Ken Keefe, Elizabeth LeMay, William H. Sanders, Carol Muehrcke:
Implementing the ADVISE security modeling formalism in Möbius. DSN 2013: 1-8 - [c138]Sobir Bazarbayev, Matti A. Hiltunen, Kaustubh R. Joshi, William H. Sanders, Richard D. Schlichting:
PSCloud: a durable context-aware personal storage cloud. HotDep 2013: 9:1-9:6 - [c137]Sobir Bazarbayev, Matti A. Hiltunen, Kaustubh R. Joshi, William H. Sanders, Richard D. Schlichting:
Content-Based Scheduling of Virtual Machines (VMs) in the Cloud. ICDCS 2013: 93-101 - [c136]Timothy M. Yardley, Robin Berthier, David M. Nicol, William H. Sanders:
Smart grid protocol testing through cyber-physical testbeds. ISGT 2013: 1-6 - [c135]Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer, An Hoa Vu, David K. Y. Yau:
Go with the flow: toward workflow-oriented security assessment. NSPW 2013: 65-76 - [c134]Ken Keefe, William H. Sanders:
Möbius Shell: A Command-Line Interface for Möbius. QEST 2013: 282-285 - [c133]William Niemira, Rakesh B. Bobba, Peter W. Sauer, William H. Sanders:
Malicious data detection in state estimation leveraging system losses & estimation of perturbed parameters. SmartGridComm 2013: 402-407 - [c132]Robin Berthier, Jorjeta G. Jetcheva, Daisuke Mashima, Jun Ho Huh, David Grochocki, Rakesh B. Bobba, Alvaro A. Cárdenas, William H. Sanders:
Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures. SmartGridComm 2013: 450-455 - [c131]Muhammad Salman Malik, Robin Berthier, Rakesh B. Bobba, Roy H. Campbell, William H. Sanders:
Formal design of communication checkers for ICCP using UPPAAL. SmartGridComm 2013: 486-491 - [c130]Uttam Thakore, Gabriel A. Weaver, William H. Sanders:
An Actor-centric, Asset-Based Monitor Deployment Model for Cloud Computing. UCC 2013: 311-312 - 2012
- [j46]Saman A. Zonouz, Katherine M. Rogers, Robin Berthier, Rakeshbabu Bobba, William H. Sanders, Thomas J. Overbye:
SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures. IEEE Trans. Smart Grid 3(4): 1790-1799 (2012) - [c129]Eric Rozier, William H. Sanders:
A framework for efficient evaluation of the fault tolerance of deduplicated storage systems. DSN 2012: 1-12 - [c128]Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Safeguarding academic accounts and resources with the University Credential Abuse Auditing System. DSN 2012: 1-8 - [c127]Ryan M. Lefever, Vikram S. Adve, William H. Sanders:
A Mirrored Data Structures Approach to Diverse Partial Memory Replication. EDCC 2012: 61-72 - [c126]William H. Sanders:
Building resilient infrastructures for smart energy systems (abstract). ISGT 2012: 1 - [c125]William H. Sanders:
TCIPG: Trustworthy cyber infrastructure for the power grid overview. ISGT 2012: 1-2 - [c124]William H. Sanders:
Assuring the trustworthiness of the smarter electric grid. NCA 2012 - [c123]Michael D. Ford, Peter Buchholz, William H. Sanders:
State-Based Analysis in ADVISE. QEST 2012: 148-157 - [c122]Ahmed M. Fawaz, Robin Berthier, William H. Sanders:
Cost modeling of response actions for automated response and recovery in AMI. SmartGridComm 2012: 348-353 - [c121]David Grochocki, Jun Ho Huh, Robin Berthier, Rakesh Bobba, William H. Sanders, Alvaro A. Cárdenas, Jorjeta G. Jetcheva:
AMI threats, intrusion detection requirements and deployment recommendations. SmartGridComm 2012: 395-400 - [c120]Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Learning from Early Attempts to Measure Information Security Performance. CSET 2012 - [c119]William H. Sanders:
Assuring the trustworthiness of the smarter electric grid. ICPE 2012: 19-20 - 2011
- [j45]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders:
Using CPU gradients for performance-aware energy conservation in multitier systems. Sustain. Comput. Informatics Syst. 1(2): 113-133 (2011) - [j44]Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, Richard D. Schlichting:
Probabilistic Model-Driven Recovery in Distributed Systems. IEEE Trans. Dependable Secur. Comput. 8(6): 913-928 (2011) - [j43]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders:
Using link gradients to predict the impact of network latency on multitier applications. IEEE/ACM Trans. Netw. 19(3): 855-868 (2011) - [c118]Saman A. Zonouz, Aashish Sharma, HariGovind V. Ramasamy, Zbigniew T. Kalbarczyk, Birgit Pfitzmann, Kevin P. McAuliffe, Ravishankar K. Iyer, William H. Sanders, Eric Cope:
Managing business health in the presence of malicious attacks. DSN Workshops 2011: 9-14 - [c117]Robin Berthier, William H. Sanders:
Specification-Based Intrusion Detection for Advanced Metering Infrastructures. PRDC 2011: 184-193 - [c116]Elizabeth LeMay, Michael D. Ford, Ken Keefe, William H. Sanders, Carol Muehrcke:
Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE). QEST 2011: 191-200 - [c115]Douglas Eskins, William H. Sanders:
The Multiple-Asymmetric-Utility System Model: A Framework for Modeling Cyber-Human Systems. QEST 2011: 233-242 - [c114]Saman A. Zonouz, Kaustubh R. Joshi, William H. Sanders:
FloGuard: Cost-Aware Systemwide Intrusion Defense via Online Forensics and On-Demand IDS Deployment. SAFECOMP 2011: 338-354 - [c113]Eric Rozier, William H. Sanders, Pin Zhou, NagaPramod Mandagere, Sandeep Uttamchandani, Mark L. Yakushev:
Modeling the Fault Tolerance Consequences of Deduplication. SRDS 2011: 75-84 - 2010
- [j42]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders:
Blackbox prediction of the impact of DVFS on end-to-end performance of multitier systems. SIGMETRICS Perform. Evaluation Rev. 37(4): 59-63 (2010) - [j41]Shravan Gaonkar, Kimberly Keeton, Arif Merchant, William H. Sanders:
Designing Dependable Storage Solutions for Shared Application Environments. IEEE Trans. Dependable Secur. Comput. 7(4): 366-380 (2010) - [c112]Ryan M. Lefever, Vikram S. Adve, William H. Sanders:
Diverse Partial Memory Replication. DSN 2010: 71-80 - [c111]Ann T. Tai, Kam S. Tso, William H. Sanders:
Diversity-inspired clustering for self-healing MANETs: Motivation, protocol, and performability evaluation. DSN 2010: 547-556 - [c110]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders:
CPU gradients: Performance-aware energy conservation in multitier systems. Green Computing Conference 2010: 15-29 - [c109]David M. Nicol, William H. Sanders, Mouna Seri, Sankalp Singh:
Experiences Validating the Access Policy Tool in Industrial Settings. HICSS 2010: 1-8 - [c108]William H. Sanders:
Quantitative Evaluation of Security Metrics. QEST 2010: 306 - [c107]Saman A. Zonouz, Kaustubh R. Joshi, William H. Sanders:
Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment. SafeConfig 2010: 71-74
2000 – 2009
- 2009
- [j40]Shravan Gaonkar, Ken Keefe, Ruth Lamprecht, Eric Rozier, Peter Kemper, William H. Sanders:
Performance and dependability modeling with Möbius. SIGMETRICS Perform. Evaluation Rev. 36(4): 16-21 (2009) - [c106]Tod Courtney, Shravan Gaonkar, Ken Keefe, Eric Rozier, William H. Sanders:
Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models. DSN 2009: 353-358 - [c105]Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley:
RRE: A game-theoretic intrusion Response and Recovery Engine. DSN 2009: 439-448 - [c104]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, Richard D. Schlichting:
Link Gradients: Predicting the Impact of Network Latency on Multitier Applications. INFOCOM 2009: 2258-2266 - [c103]Ken Keefe, Quincy Mitchell, Eric Rozier, William H. Sanders:
Remote Job Management in the Mobius Modeling Framework. QEST 2009: 209-210 - [c102]Shravan Gaonkar, William H. Sanders:
G-SSASC: Simultaneous Simulation of System Models with bounded Hazard Rates. WSC 2009: 663-673 - 2008
- [j39]