Sean Peisert's Publications
2023
Tong Wu, Anna Scaglione, Adrian Petru Surani, Daniel Arnold, Sean Peisert, "Network-Constrained Reinforcement Learning for Optimal EV Charging Control", Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), October 2023,
Robert Currie, Sean Peisert, Anna Scaglione, Aram Shumavon, Nikhil Ravi, "Data Privacy for the Grid: Toward a Data Privacy Standard for Inverter-Based and Distributed Energy Resources", IEEE Power & Energy Magazine, October 1, 2023,
Jim Basney, Sean Peisert, Scott Russell, Kelli Shute, Bart Miller, Kathy Benninger, "A Vision for Securing NSF's Essential Scientific Cyberinfrastructure - Trusted CI Five-Year Strategic Plan (2024-2029)", Trusted CI Report, August 1, 2023, doi: 10.5281/zenodo.8193607
Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon, "Optimum Noise Mechanism for Differentially Private Queries in Discrete Finite Sets", Proceedings of the 2023 IEEE International Conference on Smart Applications, Communications and Networking (SmartNets), Istanbul, Turkey, July 25, 2023,
Sean Peisert, "On Software Infrastructure: Develop, Prove, Profit? [From the Editors]", IEEE Security & Privacy, July 2023, doi: 10.1109/MSEC.2023.3273492
Raksha Ramakrishna, Anna Scaglione, Tong Wu, Nikhil Ravi, Sean Peisert, "Differential Privacy for Class-based Data: A Practical Gaussian Mechanism", June 23, 2023, doi: 10.1109/TIFS.2023.3289128
Nikhil Ravi, Anna Scaglione, Julieta Giraldez, Parth Pradhan, Chuck Moran, Sean Peisert, "Solar Photovoltaic Systems Metadata Inference and Differentially Private Publication", arXiv preprint arXiv:2304.03749, April 7, 2023, doi: 10.48550/arXiv.2304.03749
George Cybenko, Carl Landwehr, Shari Lawrence Pfleeger, Sean Peisert, A 20th Anniversary Episode Chat With S&P Editors, IEEE Security & Privacy, Pages: 9-16 April 2023, doi: 10.1109/MSEC.2023.3239179
Sean Peisert, "The First 20 Years of IEEE Security & Privacy [From the Editors]", IEEE Security & Privacy, April 1, 2023, 21(2):4-6, doi: 10.1109/MSEC.2023.3236420
Hector G. Martin, Tijana Radivojevic, Jeremy Zucker, Kristofer Bouchard, Jess Sustarich, Sean Peisert, Dan Arnold, Nathan Hillson, Gyorgy Babnigg, Jose M. Marti, Christopher J. Mungall, Gregg T. Beckham, Lucas Waldburger, James Carothers, ShivShankar Sundaram, Deb Agarwal, Blake A. Simmons, Tyler Backman, Deepanwita Banerjee, Deepti Tanjore, Lavanya Ramakrishnan, Anup Singh, "Perspectives for Self-Driving Labs in Synthetic Biology", Current Opinion in Biotechnology, February 2023, doi: 10.1016/j.copbio.2022.102881
2022
Ammar Haydari, Chen-Nee Chuah, Michael Zhang, Jane Macfarlane, Sean Peisert, "Differentially Private Map Matching for Mobility Trajectories", Proceedings of the 2022 Annual Computer Security Applications Conference (ACSAC), Austin, TX, ACM, December 2022, doi: 0.1145/3564625.3567974
Andrew Adams, Emily K. Adams, Dan Gunter, Ryan Kiser, Mark Krenz, Sean Peisert, John Zage, "Roadmap for Securing Operational Technology in NSF Scientific Research", Trusted CI Report, November 16, 2022, doi: 10.5281/zenodo.7327987
Ayaz Akram, Venkatesh Akella, Sean Peisert, Jason Lowe-Power, "SoK: Limitations of Confidential Computing via TEEs for High-Performance Compute Systems", Proceedings of the 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), September 2022,
Yize Chen, Yuanyuan Shi, Daniel Arnold, Sean Peisert, "SAVER: Safe Learning-Based Controller for Real-Time Voltage Regulation", Proceedings of the 2022 IEEE Power Engineering Society (PES) General Meeting, Denver, CO, July 2022,
Emily K. Adams, Daniel Gunter, Ryan Kiser, Mark Krenz, Sean Peisert, Susan Sons, John Zage, "Findings of the 2022 Trusted CI Study on the Security of Operational Technology in NSF Scientific Research", Trusted CI Report, July 15, 2022, doi: doi.org/10.5281/zenodo.6828675
Daniel Arnold, Sy-Toan Ngo, Ciaran Roberts, Yize Chen, Anna Scaglione, Sean Peisert, "Adam-based Augmented Random Search for Control Policies for Distributed Energy Resource Cyber Attack Mitigation", Proceedings of the 2022 American Control Conference (ACC), June 2022,
Sean Peisert, Unsafe at Any Clock Speed: the Insecurity of Computer System Design, Implementation, and Operation [From the Editors], IEEE Security & Privacy, Pages: 4-9 January 2022, doi: 10.0.4.85/MSEC.2021.3127086
2021
James R. Clavin, Yue Huang, Xin Wang, Pradeep M. Prakash, Sisi Duan, Jianwu Wang, Sean Peisert, "A Framework for Evaluating BFT", Proceedings of the IEEE International Conference on Parallel and Distributed Systems (ICPADS), IEEE, December 2021,
Andrew Adams, Kay Avila, Elisa Heymann, Mark Krenz, Jason R. Lee, Barton Miller, Sean Peisert, "Guide to Securing Scientific Software", Trusted CI Report, December 14, 2021, doi: 10.5281/zenodo.5777646
Ammar Haydari, Michael Zhang, Chen-Nee Chuah, Jane Macfarlane, Sean Peisert, Adaptive Differential Privacy Mechanism for Aggregated Mobility Dataset, arXiv preprint arXiv:2112.08487, December 10, 2021,
Yize Chen, Yuanyuan Shi, Daniel Arnold, Sean Peisert, SAVER: Safe Learning-Based Controller for Real-Time Voltage Regulation, arXiv preprint arXiv:2111.15152,, November 30, 2021,
Luca Pion-Tonachini, Kristofer Bouchard, Hector Garcia Martin, Sean Peisert, W. Bradley Holtz, Anil Aswani, Dipankar Dwivedi, Haruko Wainwright, Ghanshyam Pilania, Benjamin Nachman, Babetta L. Marrone, Nicola Falco, Prabhat, Daniel Arnold, Alejandro Wolf-Yadlin, Sarah Powers, Sharlee Climer, Quinn Jackson, Ty Carlson, Michael Sohn, Petrus Zwart, Neeraj Kumar, Amy Justice, Claire Tomlin, Daniel Jacobson, Gos Micklem, Georgios V. Gkoutos, Peter J. Bickel, Jean-Baptiste Cazier, Juliane Müller, Bobbie-Jo Webb-Robertson, Rick Stevens, Mark Anderson, Ken Kreutz-Delgado, Michael W. Mahoney, James B. Brown,, Learning from Learning Machines: a New Generation of AI Technology to Meet the Needs of Science, arXiv preprint arXiv:2111.13786, November 27, 2021,
Nikhil Ravi, Anna Scaglione, Sachin Kadam, Reinhard Gentz, Sean Peisert, Brent Lunghino, Emmanuel Levijarvi, Aram Shumavon, Differentially Private K-means Clustering Applied to Meter Data Analysis and Synthesis, arXiv preprint arXiv:2112.03801, November 23, 2021,
Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon, Optimum Noise Mechanism for Differentially Private Queries in Discrete Finite Sets, arXiv preprint arXiv:2111.11661, November 23, 2021,
Nikhil Ravi, Anna Scaglione, Sean Peisert, Colored Noise Mechanism for Differentially Private Clustering, arXiv preprint arXiv:2111.07850, November 15, 2021,
Yize Chen, Daniel Arnold, Yuanyuan Shi, Sean Peisert, Understanding the Safety Requirements for Learning-based Power Systems Operations, arXiv preprint arXiv:2110.04983, October 11, 2021,
Andrew Adams, Kay Avila, Elisa Heymann, Mark Krenz, Jason R. Lee, Barton Miller, Sean Peisert, "The State of the Scientific Software World: Findings of the 2021 Trusted CI Software Assurance Annual Challenge Interviews", Trusted CI Report, September 29, 2021,
Ayaz Akram, Venkatesh Akella, Sean Peisert, Jason Lowe-Power,, "Enabling Design Space Exploration for RISC-V Secure Compute Environments", Proceedings of the Fifth Workshop on Computer Architecture Research with RISC-V (CARRV), (co-located with ISCA 2021), June 17, 2021,
Ciaran Roberts, Sy-Toan Ngo, Alexandre Milesi, Anna Scaglione, Sean Peisert, Daniel Arnold, "Deep Reinforcement Learning for Mitigating Cyber-Physical DER Voltage Unbalance Attacks”", Proceedings of the 2021 American Control Conference (ACC), May 2021, doi: 10.23919/ACC50511.2021.9482815
Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert, "Performance Analysis of Scientific Computing Workloads on General Purpose TEEs", Proceedings of the 35th IEEE International Parallel & Distributed Processing Symposium (IPDPS), IEEE, May 2021, doi: 10.1109/IPDPS49936.2021.00115
Sean Peisert, "Trustworthy Scientific Computing", Communications of the ACM (CACM), May 2021, doi: 10.1145/3457191
Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael, "Perspectives on the SolarWinds Incident", IEEE Security & Privacy, April 2021, 7-13, doi: 10.1109/MSEC.2021.3051235
Fabio Massacci, Trent Jaeger, Sean Peisert, "SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil?", IEEE Security & Privacy, April 2021, 14-19, doi: 10.1109/MSEC.2021.3050433
Sean Peisert, Reflections on the Past, Perspectives on the Future [From the Editors], IEEE Security & Privacy, January 2021, doi: 10.1109/MSEC.2020.3034670
2020
Chris Lawson, Jose Manuel Martí, Tijana Radivojevic, Sai Vamshi R. Jonnalagadda, Reinhard Gentz, Nathan J. Hillson, Sean Peisert, Joonhoon Kim, Blake A. Simons, Christopher J. Petzold, Steven W. Singer, Aindrila Mukhopadhyay, Deepti Tanjore, Josh Dunn, Héctor García Martín,, "Machine Learning for Metabolic Engineering: A Review", Metabolic Engineering, November 19, 2020,
Ignacio Losada Carreño, Raksha Ramakrishna, Anna Scaglione, Daniel Arnold, Ciaran Roberts, Sy-Toan Ngo, Sean Peisert, David Pinney, "SODA: An Irradiance-Based Tool to Generate Sub-Minute Solar Power Stochastic Time Series", Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), IEEE, November 2020,
Ciaran Roberts Sy-Toan Ngo, Alexandre Milesi, Sean Peisert, Daniel Arnold, Shammya Saha, Anna Scaglione, Nathan Johnson, Anton Kocheturov, Dmitriy Fradkin, "Deep Reinforcement Learning for DER Cyber-Attack Mitigation", Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), IEEE, November 2020,
Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert, "Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments", arXiv preprint arXiv:2010.13216, October 25, 2020,
Sean Peisert, "An Examination and Survey of Data Confidentiality Issues and Solutions in Academic Research Computing", Trusted CI Report, September 8, 2020,
Sean Peisert, Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19 [From the Editors], IEEE Security & Privacy, Pages: 4-7 August 2020, doi: 10.1109/MSEC.2020.2992316
Bogdan Copos, Sean Peisert, "Catch Me If You Can: Using Power Analysis to Identify HPC Activity", arXiv:2005.03135 [cs.CR], May 6, 2020,
Ross Gegan, Christina Mao, Dipak Ghosal, Matt Bishop, Sean Peisert, "Anomaly Detection for Science DMZ Using System Performance Data", Proceedings of the 2020 IEEE International Conference on Computing, Networking and Communications (ICNC 2020), Big Island, HI, February 2020, doi: 10.1109/ICNC47757.2020.9049695
Anna Giannakou, Dipankar Dwivedi, Sean Peisert, "A Machine Learning Approach for Packet Loss Prediction in ScienceFlows", Future Generation Computer Systems, January 2020, 102:190-197, doi: 10.1016/j.future.2019.07.053
2019
Reinhard Gentz, Sean Peisert, "An Examination and Survey of Random Bit Flips and Scientific Computing", Trusted CI Report, December 20, 2019,
Amir Teshome Wonjiga, Louis Rilling, Christine Morin, Sean Peisert, "Blockchain as a Trusted Component in Cloud SLA Verification", Proceedings of the International Workshop on Cloud, IoT and Fog Security (CIFS), co-located with the 12th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), Auckland, New Zealand, December 2019, 93-100, doi: 10.1145/3368235.3368872
Mahdi Jamei, Raksha Ramakrishna, Teklemariam Tesfay, Reinhard Gentz, Ciaran Roberts, Anna Scaglione, Sean Peisert, "Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization", IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Communications and Data Analytics in Smart Grid, November 6, 2019, 38(1):180-192, doi: 10.1109/jsac.2019.2951971
Thomas W. Edgar, Aditya Ashok, Garret E. Seppala, K.M. Arthur-Durrett, M. Engels, Reinhard Gentz, Sean Peisert, "An Automated Disruption-Tolerant Key Management Framework for Critical Systems", Journal of Information Warfare, October 8, 2019, 18(4):85-124, doi: https://www.jinfowar.com/journal/volume-18-issue-4/automated-disruption-tolerant-device-authentication-key-management-framework-critical-systems
Reinhard Gentz, Sean Peisert, Joshua Boverhof, Daniel Gunter, "SPARCS: Stream-Processing Architecture applied in Real-time Cyber-physical Security", Proceedings of the 15th IEEE International Conference on e-Science (eScience), San Diego, CA, IEEE, September 2019, doi: 10.1109/eScience.2019.00028
Reinhard Gentz, Héctor García Martin, Edward Baidoo, Sean Peisert, "Workflow Automation in Liquid Chromatography Mass Spectrometry", Proceedings of the 15th IEEE International Conference on e-Science (eScience), San Diego, CA, IEEE, September 2019, doi: 10.1109/eScience.2019.00095
Melissa Stockman, Dipankar Dwivedi, Reinhard Gentz, Sean Peisert, "Detecting Programmable Logic Controller Code Using Machine Learning", International Journal of Critical Infrastructure Protection, September 2019, vol. 26,, doi: 10.1016/j.ijcip.2019.100306
Ciaran Roberts, Anna Scaglione, Mahdi Jamei, Reinhard Gentz, Sean Peisert, Emma M. Stewart, Chuck McParland, Alex McEachern, Daniel Arnold, "Learning Behavior of Distribution System Discrete Control Devices for Cyber-Physical Security", IEEE Transaction on Smart Grid, August 1, 2019, 11(1):749-761, doi: 0.1109/TSG.2019.2936016
Andrew Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert, Scott Russell, Susan Sons, Von Welch, John Zage, "Trusted CI Experiences in Cybersecurity and Service to Open Science", Proceedings of the Conference on Practice and Experience in Advanced Research Computing (PEARC), ACM, July 2019, doi: 10.1145/3332186.3340601
Sean Peisert, "Some Experiences in Developing Security Technology That Actually Get Used", IEEE Security & Privacy, April 2019, 17(2):4–7, doi: 10.1109/MSEC.2019.2899711
Sean Peisert, Brooks Evans, Michael Liang, Barclay Osborn, David Rusting, David Thurston, Security Without Moats and Walls: Zero-Trust Networking for Enhancing Security in R&E Environments, CENIC Annual Conference, March 19, 2019,
Sean Peisert, Experiences in Building a Mission-Driven Security R&D Program for Science and Energy, Computer Science Colloquium Seminar, University of California, Davis, February 7, 2019,
Sean Peisert, Daniel Arnold, Using Physics to Improve Cybersecurity for the Distribution Grid and Distributed Energy Resources, Naval Postgraduate School, February 5, 2019,
Sean Peisert, Building a Mission-Driven, Applied Cybersecurity R&D Program from Scratch, VISA Research, January 23, 2019,
2018
Anna Giannakou, Daniel Gunter, Sean Peisert, "Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks", Workshop on Innovating the Network for Data-Intensive Science (INDIS), November 11, 2018, doi: 10.1109/INDIS.2018.00004
Sean Peisert, Usable Computer Security and Privacy to Enable and Encourage Data Sharing for Scientific Research, National Academies of Sciences, Engineering, and Medicine Committee on Science, Engineering, Medicine, and Public Policy (COSEMPUP) Meeting, November 8, 2018,
Mahdi Jamei, Anna Scaglione, Sean Peisert, "Low-Resolution Fault Localization Using Phasor Measurement Units with Community Detection", Proceedings of the 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Allborg, Denmark, IEEE, October 29, 2018, doi: 10.1109/SmartGridComm.2018.8587461
Sean Peisert, Ciaran Roberts, Anna Scaglione, Mahdi Jamei, Reinhard Gentz, Charles McParland, Alex McEachren, Galen Rasche, Aaron Snyder, "Supporting Cyber Security of Power Distribution Systems by Detecting Differences Between Real-time Micro-Synchrophasor Measurements and Cyber-Reported SCADA - Final Report", October 15, 2018,
Sean Peisert, Security Concerns of an NRP, Second National Research Platform (NRP) Workshop, August 6, 2018,
"A Holistic Approach to Distribution Grid Intrusion Detection Systems", Ciaran Roberts, Anna Scaglione Sean Peisert,, EnergyCentral, July 18, 2018,
Sean Peisert, Cyber Security Challenges and Opportunities in High-Performance Computing Environments, International Supercomputing Conference, June 26, 2018,
Sean Peisert, Keynote: Cybersecurity for HPC Systems: State of the Art and Looking to the Future, High-Performance Computing Security Workshop, National Institute of Standards and Technology (NIST), March 28, 2018,
Sean Peisert, Eli Dart, William K. Barnett, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, Brian Tierney, "The Medical Science DMZ: An Network Design Pattern for Data-Intensive Medical Science", Journal of the American Medical Informatics Association (JAMIA), March 2018, 25(3):267-274, doi: 10.1093/jamia/ocx104
Sean Peisert, Ciaran Roberts, Cyber Security of Power Distribution Systems Using Micro-Synchrophasor Measurements and Cyber-Reported SCADA, EPRI Power Delivery & Utilization Winter 2018 Program Advisory & Sector Council Meeting, February 7, 2018,
Terry Benzel and Sean Peisert, Selected Papers from the 2017 IEEE Symposium on Security and Privacy [Guest editors' introduction], IEEE Security & Privacy, Pages: 10-11 January 2018, doi: 10.1109/MSP.2018.1331038
EM Stewart, P Top, M Chertkov, D Deka, S Backhaus, A Lokhov, C Roberts, V Hendrix, S Peisert, A Florita, TJ King, MJ Reno, "Integrated multi-scale data analytics and machine learning for the distribution grid", 2017 IEEE International Conference on Smart Grid Communications, SmartGridComm 2017, 2018, 2018-Jan:423--429, doi: 10.1109/SmartGridComm.2017.8340693
2017
David Hatchell, Patrick Miller, Michael Coleman, Sean Peisert, Cybersecurity for the Electricity Grid", Bits & Watts Annual Conference, November 6, 2017,
Sean Peisert, Security in High Performance Computing Environments, Computing Sciences/NERSC Security Seminar, October 5, 2017,
Sean Peisert, Matt Bishop, Ed Talbot,, "A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing", Proceedings of the 2017 New Security Paradigms Workshop (NSPW), Santa Cruz, CA, October 2017, 80-89, doi: 10.1145/3171533.3171536
Sean Peisert, Security and Privacy in Data-Intensive, High-Performance Computing Contexts, Berkeley Institute for Data Science (BIDS), October 2, 2017,
Jonathan Ganz, Sean Peisert, "ASLR: How Robust is the Randomness", Proceedings of the IEEE Secure Development Conference (SecDev), Cambridge, MA, IEEE Computer Society, September 24, 2017, doi: 10.1109/SecDev.2017.19
Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Emma Stewart, Sean Peisert, Chuck McParland, Alex McEachern, "Anomaly Detection Using μPMU Measurements in Distribution Grids", IEEE Transactions on Power Systems, 2017, doi: 10.1109/TPWRS.2017.2764882
Sean Peisert, "Security in High-Performance Computing Environments", Communications of the ACM (CACM), September 2017, 60(9):72-80, doi: 10.1145/3096742
Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Alex McEachern, Emma Stewart, Sean Peisert, Chuck McParland, "Online Thevenin Parameter Tracking Using Synchrophasor Data", Proceedings of the 2017 IEEE Power Engineering Society (PES) General Meeting (GM), Chicago, IL, IEEE, July 2017, doi: 10.1109/PESGM.2017.8273818
Alberto Gonzalez, Jason Leigh, Sean Peisert, Brian Tierney, Edward Balas, Predrag Radulovic, Jennifer M. Schopf, "Big Data and Analysis of Data Transfers for International Research Networks Using NetSage", Proceedings of IEEE BigData Congress 2017, Honolulu, Hawaii, June 2017, doi: 10.1109/BigDataCongress.2017.51
Sean Peisert, Mike Corn, Dewight Kramer, David Rusting, Tye Stallard, The Role of the WAN and the Community to Improve Security, 2017 UC Information Security Symposium,, June 21, 2017,
Galen Rasche, Jenna Goodward, Sheeraz Haji, Gabriel Paun, Sean Peisert, Managing Energy: Role of Data and Security, Prospect Silicon Valley 2017 Innovation and Impact Symposium, June 14, 2017,
Sean Peisert, Greg Bell, Anita Nikolich, Von Welch, Cybersecurity: New Directions for Research and Education - Your own safety is at stake when your neighbor's wall is ablaze. (—Horace), CENIC Annual Conference — The Right Connection ¦ CENIC 2.0, March 22, 2017,
Leon J. Osterweil, Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, Sean Peisert, "A Comprehensive Framework for Using Iterative Analysis to Improve Human-Intensive Process Security: An Election Example", ACM Transactions on Privacy and Security (TOPS), 2017, 20(2), doi: https://doi.org/10.1145/3041041
Sean Peisert, Von Welch, Andrew Adams, Michael Dopheide, Susan Sons, RuthAnne Bevier, Rich LeDuc, Pascal Meunier, Stephen Schwab, and Karen Stocks, Ilkay Altintas, James Cuff, Reagan Moore, Warren Raquel, "Open Science Cyber Risk Profile", February 10, 2017, doi: 2022/21259
Richard LeDuc, Sean Peisert, Karen Stocks, Von Welch, Open Science Cyber Risk Profile (OSCRP), National Science Foundation Cybersecurity Center of Excellence (CCoE) Webinar Series, January 23, 2017,
Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Emma Stewart, Sean Peisert, Chuck McParland, Alex McEachern, "Automated Anomaly Detection in Distribution Grids Using µPMU Measurements", Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS), Electric Energy Systems Track, Resilient Networks Minitrack, IEEE, January 2017, doi: http://hdl.handle.net/10125/41543
S Peisert, R Gentz, J Boverhof, C McParland, S Engle, A Elbashandy, D Gunter, "LBNL Open Power Data", January 2017, doi: 10.21990/C21599
2016
Sean Peisert, Overcoming Security and Privacy Challenges in Computing and Networking in Medical Research Environments, Department of Public Health Sciences, University of California, Davis School of Medicine,, December 14, 2016,
Sean Peisert, Emma Stewart, Alex McEachern, Supporting Cyber Security of Power Distribution Systems by Detecting Differences Between Real-time Micro-synchrophasor Measurements and Cyber-Reported SCADA, 2016 DOE CEDS Peer Review, December 8, 2016,
Sean Peisert (moderator), Jill Gemmill, Michael Sinatra, Von Welch, National Cybersecurity Panel, NSF Campus Cyberinfrastructure/ESCC/The Quilt Colocated Meeting, October 20, 2016,
Lee Beausoleil, David Lombard, Angelos Keromytis, Sean Peisert, Panel: HPC Monitoring, NSCI: High-Performance Computing Security Workshop, September 30, 2016,
Sean Peisert, Security Expert on Why HPC Matters - Cybersecurity for HPC Systems: Challenges and Opportunities, NSCI: High-Performance Computing Security Workshop, September 29, 2016,
Mahdi Jamei, Emma Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran Roberts, Alex McEachern, "Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security", IEEE Internet Computing, September 2016, 20(5):18-27, doi: 10.1109/MIC.2016.102
Jonathan Ganz, Matt Bishop, and Sean Peisert, "Security Analysis of Scantegrity, an Electronic Voting System", University of California, Davis, Department of Computer Science Technical Report, June 2016,
Alberto Gonzalez, Jason Leigh, Sean Peisert, Brian Tierney, Andrew Lee, Jennifer M. Schopf, "NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service", Proceedings of TNC16 Networking Conference, Prague, Czech Republic, June 2016,
Sean Peisert, William K. Barnett, Eli Dart, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, Brian Tierney, "The Medical Science DMZ", Journal of the American Medical Informatics Association (JAMIA), May 2, 2016, 23(6):1199-1201, doi: 10.1093/jamia/ocw032
Sean Peisert, CENIC 2016 Conference Panel: Security in R&E Networks and Campus Environments, 2016 CENIC Annual Conference, March 22, 2016,
Sean Peisert, Computer Security & the Electric Power Grid, 15th Annual ON*VECTOR Photonics Workshop, March 1, 2016,
2015
Jason Adams, Monica Lieng, Brooks Kuhn, Edward Guo, Edik Simonian, Sean Peisert, JP Delplanque, Nick Anderson, "Automated Mechanical Ventilator Waveform Analysis of Patient-Ventilator Asynchrony", CHEST Journal, Pages: 175A October 2015, doi: 10.1378/chest.2281731
PURPOSE: Mechanical ventilation is a life-saving intervention but is associated with adverse effects including ventilator-induced lung injury (VILI). Patient-ventilator asynchrony (PVA) is thought to contribute to VILI, but the study of PVA has been hampered by limited access to the high frequency, large volume data streams produced by modern ventilators and a lack of robust analytics. To address these limitations, we developed an automated pipeline for breath-by-breath analysis of ventilator waveform data.
METHODS: Simulated pressure and flow time series data representing normal breaths and common forms of PVA were generated on PB840 ventilators, collected unobtrusively using small, customized wireless peripheral devices, and transmitted to a networked server for storage and analysis. Two critical care physicians reviewed all waveforms to generate gold standards. Rule-based algorithms were developed to quantify inspiratory and expiratory tidal volumes (TV) and identify PVA subtypes including double trigger and delayed termination asynchrony. Data were split randomly into derivation and validation sets. Algorithm performance was compared to ventilator reported values and clinician annotation.
RESULTS: The mean difference between algorithm-determined and ventilator-reported TVs was 3.1% (99% CI ± 1.36%). Algorithm agreement with clinician annotation was excellent for double trigger PVA and moderate for delayed termination PVA, with Kappa statistics of 0.85 and 0.58, respectively. In the validation data set (n = 492 breaths), double trigger asynchrony was detected with an overall accuracy of 94.1%, sensitivity of 100%, and specificity of 92.8%.
CONCLUSIONS: A pipeline combining wireless ventilator data acquisition and rule-based analytic algorithms informed by the principles of bedside ventilator waveform analysis allows for automated, quantitative breath-by-breath analysis of patient-ventilator interactions.
CLINICAL IMPLICATIONS: We have recently deployed this system in the medical intensive care unit of the UC Davis Medical Center, which will enable further development of mechanical ventilation analytics. We have begun to explore the use of supervised machine learning and dynamic time series modeling to improve the classification of other common types of PVA and of clinical phenotypes associated with respiratory failure. This system will help to better define the epidemiology and clinical impact of PVA and other forms of off-target mechanical ventilation, and may lead to improved decision support and patient outcomes.