Sean Peisert
Sean Peisert

homepage
speisertatucdavis.edu

  Affiliation history
Bibliometrics: publication history
Average citations per article3.50
Citation Count98
Publication count28
Publication years2005-2017
Available for download11
Average downloads per article1,002.73
Downloads (cumulative)11,030
Downloads (12 Months)6,399
Downloads (6 Weeks)1,139
Professional ACM Member
SEARCH
ROLE
Arrow RightAuthor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


28 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 28
Result page: 1 2

Sort by:

1 published by ACM
August 2017 Communications of the ACM: Volume 60 Issue 9, September 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,118,   Downloads (12 Months): 6,003,   Downloads (Overall): 6,003

Full text available: HtmlHtml  PDFPDF
Exploring the many distinctive elements that make securing HPC systems much different than securing traditional systems.

2 published by ACM
March 2017 ACM Transactions on Privacy and Security (TOPS): Volume 20 Issue 2, May 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 165,   Downloads (Overall): 165

Full text available: PDFPDF
In this article, we present an approach for systematically improving complex processes, especially those involving human agents, hardware devices, and software systems. We illustrate the utility of this approach by applying it to part of an election process and show how it can improve the security and correctness of that ...
Keywords: elections, iterative analysis, model checking, Process modeling, fault tree analysis

3
September 2016 IEEE Internet Computing: Volume 20 Issue 5, September 2016
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

Because electric power distribution systems are undergoing many technological changes, concerns are emerging about additional vulnerabilities that might arise. Resilient cyber-physical systems (CPSs) must leverage state measures and operational models that interlink their physical and cyber assets, to assess their global state. Here, the authors describe a viable process of ...

4 published by ACM
October 2015 CPS-SPC '15: Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 7,   Downloads (12 Months): 107,   Downloads (Overall): 313

Full text available: PDFPDF
The trustworthiness and security of cyber-physical systems (CPSs), such as the power grid, are of paramount importance to ensure their safe operation, performance, and economic efficiency. The aim of many cyber-physical security techniques, such as network intrusion detection systems (NIDSs) for CPSs, is to ensure continuous reliable operation even in ...
Keywords: testbed, intrusion detection systems, cyber-physical security, cyber-physical systems, power grid

5
September 2015 IDCS 2015: Proceedings of the 8th International Conference on Internet and Distributed Computing Systems - Volume 9258
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Traditional publish/subscribe pub/sub systems may fail or cause longer message latency and higher computing resource usage in the presence of changes in the execution environment. We present the design and implementation of Mimosa Pudica, an adaptive and reliable middleware for adapting various changes in pub/sub systems. At the heart of ...

6
October 2014 SRDS '14: Proceedings of the 2014 IEEE 33rd International Symposium on Reliable Distributed Systems
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Building robust network services that can withstand a wide range of failure types is a fundamental problem in distributed systems. The most general approach, called Byzantine fault tolerance, can mask arbitrary failures. Yet it is often considered too costly to deploy in practice, and many solutions are not resilient to ...
Keywords: Byzantine fault tolerance, intrusion detection, distributed systems, state machine replication, failure detector, attacks

7
June 2014 DSN '14: Proceedings of the 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

In this paper, we describe our novel use of network intrusion detection systems (NIDS) for protecting automated distribution systems (ADS) against certain types of cyber attacks in a new way. The novelty consists of using the hybrid control environment rules and model as the baseline for what is normal and ...
Keywords: Power distribution systems, distribution automation, network security, intrusion detection systems

8 published by ACM
May 2014 DEBS '14: Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 1,   Downloads (12 Months): 8,   Downloads (Overall): 123

Full text available: PDFPDF
The popular publish/subscribe communication paradigm, for building large-scale distributed event notification systems, has attracted attention from both academia and industry due to its performance and scalability characteristics. While ordinary "web surfers" typically are not aware of minor packet loss, industrial applications often have tight timing constraints and require rigorous fault ...
Keywords: IPTV application, paxos, fault tolerance, publish/subscribe

9
May 2014 SPW '14: Proceedings of the 2014 IEEE Security and Privacy Workshops
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

The insider threat is one of the most pernicious in computer security. Traditional approaches typically instrument systems with decoys or intrusion detection mechanisms to detect individuals who abuse their privileges (the quintessential "insider"). Such an attack requires that these agents have access to resources or data in order to corrupt ...
Keywords: insider threat, process modeling, elections, sabotage, data exfiltration

10 published by ACM
September 2013 NSPW '13: Proceedings of the 2013 New Security Paradigms Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 25,   Downloads (Overall): 392

Full text available: PDFPDF
In the real world we do authentication hundreds of times a day with little effort and strong confidence. We believe that the digital world can and should catch up. The focus of this paper is about authentication for critical applications. Specifically, it is about the fundamentals for evaluating whether or ...
Keywords: biometrics, continuous authentication, principles of authentication, authentication, duress codes, multi-dimensional inputs

11
February 2013 Pattern Recognition Letters: Volume 34 Issue 3, February, 2013
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 2

High Performance Computing (HPC) is a field concerned with solving large-scale problems in science and engineering. However, the computational infrastructure of HPC systems can also be misused as demonstrated by the recent commoditization of cloud computing resources on the black market. As a first step towards addressing this, we introduce ...
Keywords: Self-organizing maps, Bayesian networks, Communication patterns, Random forests, High performance computing, Multiclass classification

12 published by ACM
September 2012 NSPW '12: Proceedings of the 2012 New Security Paradigms Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 0,   Downloads (12 Months): 14,   Downloads (Overall): 201

Full text available: PDFPDF
In this paper, we present a set of security requirements for critical systems, fundamental premises that those requirements would entail, and ideas for implementations that would instantiate those premises. We discuss the overriding requirement guiding our paradigm: that "first principles" reflects the only real security strategy, where first principles are ...
Keywords: identity binding, metrics, continuous authentication, dynamic access control, probabilistic computing, trust negotiation, assurance, fault tolerance, first principles, formal methods, insiders, perfect privacy, security policy

13
September 2012 IEEE Security and Privacy: Volume 10 Issue 5, September 2012
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

University of California, Davis educators teach numerous computer security classes for undergraduate majors and nonmajors and for graduate students. These classes have used elections, and electronic-voting systems, both as lecture material and in class projects. This column presents some of their experiences and what they've learned.
Keywords: Electronic voting,Network security,Computer security,Privacy,Security of data,Fraudlent activities,computer security education,elections,election security,computer security,privacy,voting fraud,electronic voting,e-voting

14
May 2012 International Journal of High Performance Computing Applications: Volume 26 Issue 2, May 2012
Publisher: Sage Publications, Inc.
Bibliometrics:
Citation Count: 2

Parallel computation in a high-performance computing environment can be characterized by the distributed memory access patterns of the underlying algorithm. During execution, networks of compute nodes exchange messages that indirectly exhibit these access patterns. Identifying the algorithm underlying these observable messages is the problem of latent class analysis over information ...
Keywords: communication patterns, computational dwarves, network theory, graph theory, pattern recognition

15 published by ACM
September 2010 NSPW '10: Proceedings of the 2010 New Security Paradigms Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 0,   Downloads (12 Months): 14,   Downloads (Overall): 318

Full text available: PDFPDF
Research in data sanitization (including anonymization) emphasizes ways to prevent an adversary from desanitizing data. Most work focuses on using mathematical mappings to sanitize data. A few papers examine incorporation of privacy requirements, either in the guise of templates or prioritization. Essentially these approaches reduce the information that can be ...
Keywords: ontology, sanitization, data anonymization, privacy

16
August 2010 EVT/WOTE'10: Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections
Publisher: USENIX Association
Bibliometrics:
Citation Count: 6

This paper presents an approach for continuous process improvement and illustrates its application to improving the robustness of election processes. In this approach, the Little-JIL process definition language is used to create a precise and detailed model of an election process. Given this process model and a potential undesirable event, ...

17
May 2010 SP '10: Proceedings of the 2010 IEEE Symposium on Security and Privacy
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

This article is a retrospective of concepts and people who have contributed significantly to the IEEE Symposium on Security and Privacy over the past 30 years.
Keywords: Security, Privacy, 30th Anniversary Retrospective

18 published by ACM
September 2009 NSPW '09: Proceedings of the 2009 workshop on New security paradigms workshop
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 5,   Downloads (Overall): 242

Full text available: PdfPdf
Do you believe that more than one single security paradigm exists? We do. We also believe that we have a major problem because of all these security paradigms: until we find a way to identify and understand how these paradigms restrict our analyses we will never have the ability to ...
Keywords: computer security, cybersecurity, digital forensics, paradigm, reality tunnels, consulting, management, voting, collective paradigms, information security, multi-paradigm composition analysis, new security paradigms workshop, Kuhn, NSPW, e-voting, forensics, statistical analysis

19
August 2009 EVT/WOTE'09: Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
Publisher: USENIX Association
Bibliometrics:
Citation Count: 2

Over the past six years, the nation has moved rapidly from punch cards and levers to electronic voting systems. These new systems have occasionally presented election officials with puzzling technical irregularities. The national experience has included unexpected and unexplained incidents in each phase of the election process: preparations, balloting, tabulation, ...

20
May 2009 SADFE '09: Proceedings of the 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

A systematic approach to digital forensic engineering acknowledges the close, intertwine relationship between digital forensics and information security. Just as their technical structures are interrelated, so, too, are issues relating to legal and social frameworks within which they are used. We examine this critical relationship as to critical cyber infrastructure ...
Keywords: digital, forensics, technical, legal, social, frameworks, media, government, cyberinfrastructure, security



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us