Articles with public access mandates - William H SandersLearn more
Not available anywhere: 1
CyberSAGE: The cyber security argument graph evaluation tool
WG Temple, Y Wu, C Cheh, Y Li, B Chen, ZT Kalbarczyk, WH Sanders, ...
Empirical Software Engineering 28 (1), 18, 2023
Mandates: A*Star, Singapore
Available somewhere: 34
PCA-based method for detecting integrity attacks on advanced metering infrastructure
V Badrinath Krishna, GA Weaver, WH Sanders
Quantitative Evaluation of Systems: 12th International Conference, QEST 2015 …, 2015
Mandates: US Department of Energy
ARIMA-based modeling and validation of consumption readings in power grids
V Badrinath Krishna, RK Iyer, WH Sanders
Critical Information Infrastructures Security: 10th International Conference …, 2016
Mandates: US Department of Energy
F-DETA: A framework for detecting electricity theft attacks in smart grids
VB Krishna, K Lee, GA Weaver, RK Iyer, WH Sanders
2016 46th Annual IEEE/IFIP international conference on dependable systems …, 2016
Mandates: US Department of Energy
Evaluating detectors on optimal attack vectors that enable electricity theft and DER fraud
VB Krishna, CA Gunter, WH Sanders
IEEE Journal of Selected Topics in Signal Processing 12 (4), 790-805, 2018
Mandates: US Department of Energy
An unsupervised multi-detector approach for identifying malicious lateral movement
A Bohara, MA Noureddine, A Fawaz, WH Sanders
2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 224-233, 2017
Mandates: US Department of Defense
Security analysis of urban railway systems: the need for a cyber-physical perspective
B Chen, C Schmittner, Z Ma, WG Temple, X Dong, DL Jones, WH Sanders
Computer Safety, Reliability, and Security: SAFECOMP 2015 Workshops, ASSURE …, 2015
Mandates: A*Star, Singapore
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Mandates: US National Science Foundation, US Department of Defense
Model-based cybersecurity assessment with nescor smart grid failure scenarios
S Jauhar, B Chen, WG Temple, X Dong, Z Kalbarczyk, WH Sanders, ...
2015 IEEE 21st Pacific Rim international symposium on dependable computing …, 2015
Mandates: A*Star, Singapore
Go with the flow: Toward workflow-oriented security assessment
B Chen, Z Kalbarczyk, DM Nicol, WH Sanders, R Tan, WG Temple, ...
Proceedings of the 2013 New Security Paradigms Workshop, 65-76, 2013
Mandates: A*Star, Singapore
Access control for distributed ledgers in the internet of things: A networking approach
A Cullen, P Ferraro, W Sanders, L Vigneri, R Shorten
IEEE Internet of Things Journal 9 (3), 2277-2292, 2021
Mandates: Science Foundation Ireland
Provenance for intent-based networking
BE Ujcich, A Bates, WH Sanders
2020 6th IEEE conference on network softwarization (NetSoft), 195-199, 2020
Mandates: US National Science Foundation
Attain: An attack injection framework for software-defined networking
BE Ujcich, U Thakore, WH Sanders
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
Mandates: US Department of Defense
Ed4gap: Efficient detection for goose-based poisoning attacks on iec 61850 substations
A Bohara, J Ros-Giralt, G Elbez, A Valdes, K Nahrstedt, WH Sanders
2020 IEEE International Conference on Communications, Control, and Computing …, 2020
Mandates: US Department of Energy, Helmholtz Association, Federal Ministry of …
A provenance model for the european union general data protection regulation
BE Ujcich, A Bates, WH Sanders
Provenance and Annotation of Data and Processes: 7th International …, 2018
Mandates: US National Science Foundation
Developing models for physical attacks in cyber-physical systems
C Cheh, K Keefe, B Feddersen, B Chen, WG Temple, WH Sanders
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
Mandates: A*Star, Singapore, National Research Foundation, Singapore
Automatic generation of security argument graphs
NO Tippenhauer, WG Temple, AH Vu, B Chen, DM Nicol, Z Kalbarczyk, ...
2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing …, 2014
Mandates: A*Star, Singapore
On train automatic stop control using balises: Attacks and a software-only countermeasure
WG Temple, BAN Tran, B Chen, Z Kalbarczyk, WH Sanders
2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing …, 2017
Mandates: A*Star, Singapore
Data-driven model-based detection of malicious insiders via physical access logs
C Cheh, U Thakore, A Fawaz, B Chen, WG Temple, WH Sanders
ACM Transactions on Modeling and Computer Simulation (TOMACS) 29 (4), 1-25, 2019
Mandates: A*Star, Singapore
Automated discovery of cross-plane event-based vulnerabilities in software-defined networking
BE Ujcich, S Jero, R Skowyra, SR Gomez, A Bates, WH Sanders, ...
Network and Distributed System Security Symposium, 2020
Mandates: US National Science Foundation, US Department of Defense
Publication and funding information is determined automatically by a computer program