Sean Peisert

Orcid: 0000-0003-3566-9719

Affiliations:
  • Lawrence Berkeley National Laboratory, CA, USA
  • University of California, Davis, USA


According to our database1, Sean Peisert authored at least 100 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Optimum noise mechanism for differentially private queries in discrete finite sets.
Cybersecur., December, 2024

Graph-Signal-to-Graph Matching for Network De-Anonymization Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

Differentially Private Communication of Measurement Anomalies in the Smart Grid.
CoRR, 2024

Privacy Leakage In Graph Signal To Graph Matching Problems.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
Differential Privacy for Class-Based Data: A Practical Gaussian Mechanism.
IEEE Trans. Inf. Forensics Secur., 2023

On Software Infrastructure: Develop, Prove, Profit?
IEEE Secur. Priv., 2023

The First 20 Years of IEEE Security & Privacy.
IEEE Secur. Priv., 2023

Solar Photovoltaic Systems Metadata Inference and Differentially Private Publication.
CoRR, 2023

Optimum Noise Mechanism for Probabilistic Differentially Private Queries in Discrete Finite Sets.
Proceedings of the International Conference on Smart Applications, 2023

Network-Constrained Reinforcement Learning for Optimal EV Charging Control.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Differentially Private -Means Clustering Applied to Meter Data Analysis and Synthesis.
IEEE Trans. Smart Grid, 2022

Unsafe at Any Clock Speed: The Insecurity of Computer System Design, Implementation, and Operation.
IEEE Secur. Priv., 2022

Adaptive Control of Distributed Energy Resources for Distribution Grid Voltage Stability.
CoRR, 2022

SoK: Limitations of Confidential Computing via TEEs for High-Performance Compute Systems.
Proceedings of the 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), 2022

Adam-based Augmented Random Search for Control Policies for Distributed Energy Resource Cyber Attack Mitigation.
Proceedings of the American Control Conference, 2022

Differentially Private Map Matching for Mobility Trajectories.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Perspectives on the SolarWinds Incident.
IEEE Secur. Priv., 2021

Reflections on the Past, Perspectives on the Future [From the Editors].
IEEE Secur. Priv., 2021

SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil?
IEEE Secur. Priv., 2021

Adaptive Differential Privacy Mechanism for Aggregated Mobility Dataset.
CoRR, 2021

SAVER: Safe Learning-Based Controller for Real-Time Voltage Regulation.
CoRR, 2021

Learning from learning machines: a new generation of AI technology to meet the needs of science.
CoRR, 2021

Colored Noise Mechanism for Differentially Private Clustering.
CoRR, 2021

Understanding the Safety Requirements for Learning-based Power Systems Operations.
CoRR, 2021

Trustworthy scientific computing.
Commun. ACM, 2021

Performance Analysis of Scientific Computing Workloads on General Purpose TEEs.
Proceedings of the 35th IEEE International Parallel and Distributed Processing Symposium, 2021

A Framework for Evaluating BFT.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

Deep Reinforcement Learning for Mitigating Cyber-Physical DER Voltage Unbalance Attacks.
Proceedings of the 2021 American Control Conference, 2021

2020
Learning Behavior of Distribution System Discrete Control Devices for Cyber-Physical Security.
IEEE Trans. Smart Grid, 2020

Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization.
IEEE J. Sel. Areas Commun., 2020

Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19.
IEEE Secur. Priv., 2020

A machine learning approach for packet loss prediction in science flows.
Future Gener. Comput. Syst., 2020

Lyapunov Stability of Smart Inverters Using Linearized DistFlow Approximation.
CoRR, 2020

Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments.
CoRR, 2020

Catch Me If You Can: Using Power Analysis to Identify HPC Activity.
CoRR, 2020

Deep Reinforcement Learning for DER Cyber-Attack Mitigation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

SoDa: An Irradiance-Based Synthetic Solar Data Generation Tool.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Anomaly Detection for Science DMZs Using System Performance Data.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

2019
Detecting control system misbehavior by fingerprinting programmable logic controller functionality.
Int. J. Crit. Infrastructure Prot., 2019

Some Experiences in Developing Security Technology That Actually Get Used.
IEEE Secur. Priv., 2019

Trusted CI Experiences in Cybersecurity and Service to Open Science.
Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning), 2019

Blockchain as a Trusted Component in Cloud SLA Verification.
Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, 2019

SPARCS: Stream-Processing Architecture Applied in Real-Time Cyber-Physical Security.
Proceedings of the 15th International Conference on eScience, 2019

Workflow Automation in Liquid Chromatography Mass Spectrometry.
Proceedings of the 15th International Conference on eScience, 2019

2018
The medical science DMZ: a network design pattern for data-intensive medical science.
J. Am. Medical Informatics Assoc., 2018

Selected Papers from the 2017 IEEE Symposium on Security and Privacy.
IEEE Secur. Priv., 2018

Low-Resolution Fault Localization Using Phasor Measurement Units with Community Detection.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks.
Proceedings of the 5th IEEE/ACM International Workshop on Innovating the Network for Data-Intensive Science, 2018

2017
Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example.
ACM Trans. Priv. Secur., 2017

The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity.
IEEE Secur. Priv., 2017

Anomaly Detection Using Optimally-Placed Micro-PMU Sensors in Distribution Grids.
CoRR, 2017

Security in high-performance computing environments.
Commun. ACM, 2017

Integrated multi-scale data analytics and machine learning for the distribution grid.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

ASLR: How Robust Is the Randomness?
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017

A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

Automated Anomaly Detection in Distribution Grids Using uPMU Measurements.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Big Data and Analysis of Data Transfers for International Research Networks Using NetSage.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

2016
The Medical Science DMZ.
J. Am. Medical Informatics Assoc., 2016

Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Toward Critical Infrastructure Security.
IEEE Internet Comput., 2016

Automated Anomaly Detection in Distribution Grids Using μPMU Measurements.
CoRR, 2016

2015
hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost.
IEEE Trans. Dependable Secur. Comput., 2015

Towards a Self-Adaptive Middleware for Building Reliable Publish/Subscribe Systems.
Proceedings of the Internet and Distributed Computing Systems, 2015

Techniques for the dynamic randomization of network attributes.
Proceedings of the International Carnahan Conference on Security Technology, 2015

A Real-Time Testbed Environment for Cyber-Physical Security on the Power Grid.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

2014
Designed-in Security for Cyber-Physical Systems.
IEEE Secur. Priv., 2014

Control Systems Security from the Front Lines.
IEEE Secur. Priv., 2014

Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction].
IEEE Secur. Priv., 2014

The IEEE Symposium on Security and Privacy, in Retrospect.
IEEE Secur. Priv., 2014

Monitoring Security of Networked Control Systems: It's the Physics.
IEEE Secur. Priv., 2014

ByzID: Byzantine Fault Tolerance from Intrusion Detection.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

Insider Threat Identification by Process Analysis.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

A hybrid network IDS for protective digital relays in the power transmission grid.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration.
Proceedings of the Principles of Distributed Systems - 18th International Conference, 2014

Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

P2S: a fault-tolerant publish/subscribe infrastructure.
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014

2013
Multiclass classification of distributed memory parallel computations.
Pattern Recognit. Lett., 2013

Principles of authentication.
Proceedings of the New Security Paradigms Workshop, 2013

2012
Network-theoretic classification of parallel computation patterns.
Int. J. High Perform. Comput. Appl., 2012

Security and Elections.
IEEE Secur. Priv., 2012

Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501).
Dagstuhl Reports, 2012

Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems.
Proceedings of the New Security Paradigms Workshop, 2012

Networked loads in the distribution grid.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

2010
A Risk Management Approach to the "Insider Threat".
Proceedings of the Insider Threats in Cyber Security, 2010

Modeling and Analyzing Faults to Improve Election Process Robustness.
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010

Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Relationships and data sanitization: a study in scarlet.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

2009
E-Voting and Forensics: Prying Open the Black Box.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure Security.
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009

Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet Juvenal.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Case Studies of an Insider Framework.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
Computer Forensics in Forensis.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

We have met the enemy and he is us.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

2007
A model of forensic analysis using goal-oriented logging.
PhD thesis, 2007

Analysis of Computer Intrusions Using Sequences of Function Calls.
IEEE Trans. Dependable Secur. Comput., 2007

I Am a Scientist, Not a Philosopher!
IEEE Secur. Priv., 2007

Toward Models for Forensic Analysis.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

How to Design Computer Security Experiments.
Proceedings of the Fifth World Conference on Information Security Education, 2007

2005
Forensics for System Administrators.
login Usenix Mag., 2005

Principles-driven forensic analysis.
Proceedings of the New Security Paradigms Workshop 2005, 2005


  Loading...