Sean Peisert
Sean Peisert
Security and Privacy R&D Lead, Berkeley Lab; Associate Adjunct Professor, UC Davis
Verified email at ucdavis.edu - Homepage
Title
Cited by
Cited by
Year
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
M Stonebraker
Communications of the ACM 54 (6), 72-80, 2011
133*2011
We have met the enemy and he is us
M Bishop, S Engle, S Peisert, S Whalen, C Gates
Proceedings of the 2008 New Security Paradigms Workshop, 1-12, 2008
892008
Computer forensics in forensis
S Peisert, M Bishop, K Marzullo
2008 Third International Workshop on Systematic Approaches to Digital …, 2008
852008
Analysis of computer intrusions using sequences of function calls
S Peisert, M Bishop, S Karin, K Marzullo
IEEE Transactions on dependable and secure computing 4 (2), 137-150, 2007
852007
Toward models for forensic analysis
S Peisert, M Bishop, S Karin, K Marzullo
Second International Workshop on Systematic Approaches to Digital Forensic …, 2007
642007
Anomaly Detection Using Optimally Placed Sensors in Distribution Grids
M Jamei, A Scaglione, C Roberts, E Stewart, S Peisert, C McParland, ...
IEEE Transactions on Power Systems 33 (4), 3611-3623, 2017
622017
How to design computer security experiments
S Peisert, M Bishop
Fifth World Conference on Information Security Education, 141-148, 2007
582007
Insider threat identification by process analysis
M Bishop, HM Conboy, H Phan, BI Simidchieva, GS Avrunin, LA Clarke, ...
2014 IEEE Security and Privacy Workshops, 251-264, 2014
532014
A risk management approach to the “insider threat”
M Bishop, S Engle, DA Frincke, C Gates, FL Greitzer, S Peisert, S Whalen
Insider threats in cyber security, 115-137, 2010
492010
BChain: Byzantine replication with high throughput and embedded reconfiguration
S Duan, H Meling, S Peisert, H Zhang
International Conference on Principles of Distributed Systems, 91-106, 2014
422014
Hybrid control network intrusion detection systems for automated power distribution systems
M Parvania, G Koutsandria, V Muthukumary, S Peisert, C McParland, ...
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
422014
A model of forensic analysis using goal-oriented logging
SP Peisert
UC San Diego, 2007
422007
Case studies of an insider framework
M Bishop, S Engle, S Peisert, S Whalen, C Gates
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
402009
A hybrid network IDS for protective digital relays in the power transmission grid
G Koutsandria, V Muthukumar, M Parvania, S Peisert, C McParland, ...
2014 IEEE International Conference on Smart Grid Communications …, 2014
382014
Relationships and data sanitization: a study in scarlet
M Bishop, J Cummins, S Peisert, A Singh, B Bhumiratana, D Agarwal, ...
Proceedings of the 2010 New Security Paradigms Workshop, 151-164, 2010
382010
Principles-driven forensic analysis
S Peisert, S Karin, M Bishop, K Marzullo
Proceedings of the 2005 workshop on New security paradigms, 85-93, 2005
382005
Micro synchrophasor-based intrusion detection in automated distribution systems: Toward critical infrastructure security
M Jamei, E Stewart, S Peisert, A Scaglione, C McParland, C Roberts, ...
IEEE Internet Computing 20 (5), 18-27, 2016
342016
Techniques for the dynamic randomization of network attributes
AR Chavez, WMS Stout, S Peisert
2015 International Carnahan Conference on Security Technology (ICCST), 1-6, 2015
312015
Monitoring Security of Networked Control Systems: It's the Physics
C McParland, S Peisert, A Scaglione
IEEE Security & Privacy 12 (6), 32-39, 2014
272014
Modeling and analyzing faults to improve election process robustness
BI Simidchieva, S Engle, M Clifford, AC Jones, S Peisert, M Bishop, ...
EVT/WOTE, 2010
272010
The system can't perform the operation now. Try again later.
Articles 1–20