Sean Peisert
Orcid: 0000-0003-3566-9719Affiliations:
- Lawrence Berkeley National Laboratory, CA, USA
- University of California, Davis, USA
According to our database1,
Sean Peisert
authored at least 100 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Cybersecur., December, 2024
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
Solar Photovoltaic Systems Metadata Inference and Differentially Private Publication.
CoRR, 2023
Optimum Noise Mechanism for Probabilistic Differentially Private Queries in Discrete Finite Sets.
Proceedings of the International Conference on Smart Applications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
2022
Differentially Private -Means Clustering Applied to Meter Data Analysis and Synthesis.
IEEE Trans. Smart Grid, 2022
Unsafe at Any Clock Speed: The Insecurity of Computer System Design, Implementation, and Operation.
IEEE Secur. Priv., 2022
Adaptive Control of Distributed Energy Resources for Distribution Grid Voltage Stability.
CoRR, 2022
SoK: Limitations of Confidential Computing via TEEs for High-Performance Compute Systems.
Proceedings of the 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), 2022
Adam-based Augmented Random Search for Control Policies for Distributed Energy Resource Cyber Attack Mitigation.
Proceedings of the American Control Conference, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Secur. Priv., 2021
IEEE Secur. Priv., 2021
Learning from learning machines: a new generation of AI technology to meet the needs of science.
CoRR, 2021
CoRR, 2021
Proceedings of the 35th IEEE International Parallel and Distributed Processing Symposium, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Deep Reinforcement Learning for Mitigating Cyber-Physical DER Voltage Unbalance Attacks.
Proceedings of the 2021 American Control Conference, 2021
2020
Learning Behavior of Distribution System Discrete Control Devices for Cyber-Physical Security.
IEEE Trans. Smart Grid, 2020
Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization.
IEEE J. Sel. Areas Commun., 2020
Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19.
IEEE Secur. Priv., 2020
Future Gener. Comput. Syst., 2020
CoRR, 2020
Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments.
CoRR, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the International Conference on Computing, Networking and Communications, 2020
2019
Detecting control system misbehavior by fingerprinting programmable logic controller functionality.
Int. J. Crit. Infrastructure Prot., 2019
IEEE Secur. Priv., 2019
Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning), 2019
Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, 2019
Proceedings of the 15th International Conference on eScience, 2019
Proceedings of the 15th International Conference on eScience, 2019
2018
The medical science DMZ: a network design pattern for data-intensive medical science.
J. Am. Medical Informatics Assoc., 2018
IEEE Secur. Priv., 2018
Low-Resolution Fault Localization Using Phasor Measurement Units with Community Detection.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 5th IEEE/ACM International Workshop on Innovating the Network for Data-Intensive Science, 2018
2017
Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example.
ACM Trans. Priv. Secur., 2017
The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity.
IEEE Secur. Priv., 2017
CoRR, 2017
Integrated multi-scale data analytics and machine learning for the distribution grid.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017
A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing.
Proceedings of the 2017 New Security Paradigms Workshop, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Big Data and Analysis of Data Transfers for International Research Networks Using NetSage.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017
2016
Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Toward Critical Infrastructure Security.
IEEE Internet Comput., 2016
CoRR, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
Proceedings of the Internet and Distributed Computing Systems, 2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015
2014
Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction].
IEEE Secur. Priv., 2014
IEEE Secur. Priv., 2014
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Proceedings of the Principles of Distributed Systems - 18th International Conference, 2014
Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014
2013
Pattern Recognit. Lett., 2013
Proceedings of the New Security Paradigms Workshop, 2013
2012
Int. J. High Perform. Comput. Appl., 2012
Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501).
Dagstuhl Reports, 2012
Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems.
Proceedings of the New Security Paradigms Workshop, 2012
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012
2010
Proceedings of the Insider Threats in Cyber Security, 2010
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
2009
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009
Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure Security.
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009
Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet Juvenal.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
2008
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008
Proceedings of the 2008 Workshop on New Security Paradigms, 2008
2007
IEEE Trans. Dependable Secur. Comput., 2007
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007
Proceedings of the Fifth World Conference on Information Security Education, 2007
2005
Proceedings of the New Security Paradigms Workshop 2005, 2005