Folgen
Sean Peisert
Sean Peisert
Cybersecurity & Privacy R&D Lead, Lawrence Berkeley National Laboratory; Adjunct Professor, UC Davis
Bestätigte E-Mail-Adresse bei lbl.gov - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Machine learning for metabolic engineering: A review
CE Lawson, JM Martí, T Radivojevic, SVR Jonnalagadda, R Gentz, ...
Metabolic Engineering 63, 34-60, 2021
2282021
Anomaly Detection Using Optimally Placed Sensors in Distribution Grids
M Jamei, A Scaglione, C Roberts, E Stewart, S Peisert, C McParland, ...
IEEE Transactions on Power Systems 33 (4), 3611-3623, 2017
1482017
We have met the enemy and he is us
M Bishop, S Engle, S Peisert, S Whalen, C Gates
Proceedings of the 2008 new security paradigms workshop, 1-12, 2008
1132008
Computer forensics in forensis
S Peisert, M Bishop, K Marzullo
ACM SIGOPS Operating Systems Review 42 (3), 112-122, 2008
962008
Perspectives on the solarwinds incident
S Peisert, B Schneier, H Okhravi, F Massacci, T Benzel, C Landwehr, ...
IEEE Security & Privacy 19 (2), 7-13, 2021
932021
Analysis of computer intrusions using sequences of function calls
S Peisert, M Bishop, S Karin, K Marzullo
IEEE Transactions on dependable and secure computing 4 (2), 137-150, 2007
912007
BChain: Byzantine replication with high throughput and embedded reconfiguration
S Duan, H Meling, S Peisert, H Zhang
Principles of Distributed Systems: 18th International Conference, OPODIS …, 2014
882014
Insider threat identification by process analysis
M Bishop, HM Conboy, H Phan, BI Simidchieva, GS Avrunin, LA Clarke, ...
2014 IEEE Security and Privacy Workshops, 251-264, 2014
802014
How to design computer security experiments
S Peisert, M Bishop
Fifth World Conference on Information Security Education: Proceedings of the …, 2007
762007
A risk management approach to the “insider threat”
M Bishop, S Engle, DA Frincke, C Gates, FL Greitzer, S Peisert, S Whalen
Insider threats in cyber security, 115-137, 2010
742010
Toward models for forensic analysis
S Peisert, M Bishop, S Karin, K Marzullo
Second International Workshop on Systematic Approaches to Digital Forensic …, 2007
732007
Hybrid control network intrusion detection systems for automated power distribution systems
M Parvania, G Koutsandria, V Muthukumary, S Peisert, C McParland, ...
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
662014
A hybrid network IDS for protective digital relays in the power transmission grid
G Koutsandria, V Muthukumar, M Parvania, S Peisert, C McParland, ...
2014 IEEE international conference on smart grid communications …, 2014
562014
Micro synchrophasor-based intrusion detection in automated distribution systems: Toward critical infrastructure security
M Jamei, E Stewart, S Peisert, A Scaglione, C McParland, C Roberts, ...
IEEE Internet Computing 20 (5), 18-27, 2016
552016
A real-time testbed environment for cyber-physical security on the power grid
G Koutsandria, R Gentz, M Jamei, A Scaglione, S Peisert, C McParland
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and …, 2015
542015
hBFT: speculative Byzantine fault tolerance with minimum cost
S Duan, S Peisert, KN Levitt
IEEE Transactions on Dependable and Secure Computing 12 (1), 58-70, 2014
532014
Techniques for the dynamic randomization of network attributes
AR Chavez, WMS Stout, S Peisert
2015 international carnahan conference on security technology (ICCST), 1-6, 2015
522015
Phasor measurement units optimal placement and performance limits for fault localization
M Jamei, R Ramakrishna, T Tesfay, R Gentz, C Roberts, A Scaglione, ...
IEEE Journal on Selected Areas in Communications 38 (1), 180-192, 2019
502019
Case studies of an insider framework
M Bishop, S Engle, S Peisert, S Whalen, C Gates
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
502009
Security in high-performance computing environments
S Peisert
Communications of the ACM 60 (9), 72-80, 2017
482017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20