Skip to navigation Skip to content
Careers | Phone Book | A - Z Index
Usable Data Systems Group

Sean Peisert's Publications

2023

Tong Wu, Anna Scaglione, Adrian Petru Surani, Daniel Arnold, Sean Peisert, "Network-Constrained Reinforcement Learning for Optimal EV Charging Control", Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), October 2023,

Robert Currie, Sean Peisert, Anna Scaglione, Aram Shumavon, Nikhil Ravi, "Data Privacy for the Grid: Toward a Data Privacy Standard for Inverter-Based and Distributed Energy Resources", IEEE Power & Energy Magazine, October 1, 2023,

Jim Basney, Sean Peisert, Scott Russell, Kelli Shute, Bart Miller, Kathy Benninger, "A Vision for Securing NSF's Essential Scientific Cyberinfrastructure - Trusted CI Five-Year Strategic Plan (2024-2029)", Trusted CI Report, August 1, 2023, doi: 10.5281/zenodo.8193607

Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon, "Optimum Noise Mechanism for Differentially Private Queries in Discrete Finite Sets", Proceedings of the 2023 IEEE International Conference on Smart Applications, Communications and Networking (SmartNets), Istanbul, Turkey, July 25, 2023,

Raksha Ramakrishna, Anna Scaglione, Tong Wu, Nikhil Ravi, Sean Peisert, "Differential Privacy for Class-based Data: A Practical Gaussian Mechanism", June 23, 2023, doi: 10.1109/TIFS.2023.3289128

Nikhil Ravi, Anna Scaglione, Julieta Giraldez, Parth Pradhan, Chuck Moran, Sean Peisert, "Solar Photovoltaic Systems Metadata Inference and Differentially Private Publication", arXiv preprint arXiv:2304.03749, April 7, 2023, doi: 10.48550/arXiv.2304.03749

George Cybenko, Carl Landwehr, Shari Lawrence Pfleeger, Sean Peisert, A 20th Anniversary Episode Chat With S&P Editors, IEEE Security & Privacy, Pages: 9-16 April 2023, doi: 10.1109/MSEC.2023.3239179

Sean Peisert, "The First 20 Years of IEEE Security & Privacy [From the Editors]", IEEE Security & Privacy, April 1, 2023, 21(2):4-6, doi: 10.1109/MSEC.2023.3236420

Hector G. Martin, Tijana Radivojevic, Jeremy Zucker, Kristofer Bouchard, Jess Sustarich, Sean Peisert, Dan Arnold, Nathan Hillson, Gyorgy Babnigg, Jose M. Marti, Christopher J. Mungall, Gregg T. Beckham, Lucas Waldburger, James Carothers, ShivShankar Sundaram, Deb Agarwal, Blake A. Simmons, Tyler Backman, Deepanwita Banerjee, Deepti Tanjore, Lavanya Ramakrishnan, Anup Singh, "Perspectives for Self-Driving Labs in Synthetic Biology", Current Opinion in Biotechnology, February 2023, doi: 10.1016/j.copbio.2022.102881

2022

Ammar Haydari, Chen-Nee Chuah, Michael Zhang, Jane Macfarlane, Sean Peisert, "Differentially Private Map Matching for Mobility Trajectories", Proceedings of the 2022 Annual Computer Security Applications Conference (ACSAC), Austin, TX, ACM, December 2022, doi: 0.1145/3564625.3567974

Andrew Adams, Emily K. Adams, Dan Gunter, Ryan Kiser, Mark Krenz, Sean Peisert, John Zage, "Roadmap for Securing Operational Technology in NSF Scientific Research", Trusted CI Report, November 16, 2022, doi: 10.5281/zenodo.7327987

Ayaz Akram, Venkatesh Akella, Sean Peisert, Jason Lowe-Power, "SoK: Limitations of Confidential Computing via TEEs for High-Performance Compute Systems", Proceedings of the 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), September 2022,

Yize Chen, Yuanyuan Shi, Daniel Arnold, Sean Peisert, "SAVER: Safe Learning-Based Controller for Real-Time Voltage Regulation", Proceedings of the 2022 IEEE Power Engineering Society (PES) General Meeting, Denver, CO, July 2022,

Emily K. Adams, Daniel Gunter, Ryan Kiser, Mark Krenz, Sean Peisert, Susan Sons, John Zage, "Findings of the 2022 Trusted CI Study on the Security of Operational Technology in NSF Scientific Research", Trusted CI Report, July 15, 2022, doi: doi.org/10.5281/zenodo.6828675

Daniel Arnold, Sy-Toan Ngo, Ciaran Roberts, Yize Chen, Anna Scaglione, Sean Peisert, "Adam-based Augmented Random Search for Control Policies for Distributed Energy Resource Cyber Attack Mitigation", Proceedings of the 2022 American Control Conference (ACC), June 2022,

Sean Peisert, Unsafe at Any Clock Speed: the Insecurity of Computer System Design, Implementation, and Operation [From the Editors], IEEE Security & Privacy, Pages: 4-9 January 2022, doi: 10.0.4.85/MSEC.2021.3127086

2021

James R. Clavin, Yue Huang, Xin Wang, Pradeep M. Prakash, Sisi Duan, Jianwu Wang, Sean Peisert, "A Framework for Evaluating BFT", Proceedings of the IEEE International Conference on Parallel and Distributed Systems (ICPADS), IEEE, December 2021,

Andrew Adams, Kay Avila, Elisa Heymann, Mark Krenz, Jason R. Lee, Barton Miller, Sean Peisert, "Guide to Securing Scientific Software", Trusted CI Report, December 14, 2021, doi: 10.5281/zenodo.5777646

Ammar Haydari, Michael Zhang, Chen-Nee Chuah, Jane Macfarlane, Sean Peisert, Adaptive Differential Privacy Mechanism for Aggregated Mobility Dataset, arXiv preprint arXiv:2112.08487, December 10, 2021,

Yize Chen, Yuanyuan Shi, Daniel Arnold, Sean Peisert, SAVER: Safe Learning-Based Controller for Real-Time Voltage Regulation, arXiv preprint arXiv:2111.15152,, November 30, 2021,

Luca Pion-Tonachini, Kristofer Bouchard, Hector Garcia Martin, Sean Peisert, W. Bradley Holtz, Anil Aswani, Dipankar Dwivedi, Haruko Wainwright, Ghanshyam Pilania, Benjamin Nachman, Babetta L. Marrone, Nicola Falco, Prabhat, Daniel Arnold, Alejandro Wolf-Yadlin, Sarah Powers, Sharlee Climer, Quinn Jackson, Ty Carlson, Michael Sohn, Petrus Zwart, Neeraj Kumar, Amy Justice, Claire Tomlin, Daniel Jacobson, Gos Micklem, Georgios V. Gkoutos, Peter J. Bickel, Jean-Baptiste Cazier, Juliane Müller, Bobbie-Jo Webb-Robertson, Rick Stevens, Mark Anderson, Ken Kreutz-Delgado, Michael W. Mahoney, James B. Brown,, Learning from Learning Machines: a New Generation of AI Technology to Meet the Needs of Science, arXiv preprint arXiv:2111.13786, November 27, 2021,

Nikhil Ravi, Anna Scaglione, Sachin Kadam, Reinhard Gentz, Sean Peisert, Brent Lunghino, Emmanuel Levijarvi, Aram Shumavon, Differentially Private K-means Clustering Applied to Meter Data Analysis and Synthesis, arXiv preprint arXiv:2112.03801, November 23, 2021,

Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon, Optimum Noise Mechanism for Differentially Private Queries in Discrete Finite Sets, arXiv preprint arXiv:2111.11661, November 23, 2021,

Nikhil Ravi, Anna Scaglione, Sean Peisert, Colored Noise Mechanism for Differentially Private Clustering, arXiv preprint arXiv:2111.07850, November 15, 2021,

Yize Chen, Daniel Arnold, Yuanyuan Shi, Sean Peisert, Understanding the Safety Requirements for Learning-based Power Systems Operations, arXiv preprint arXiv:2110.04983, October 11, 2021,

Andrew Adams, Kay Avila, Elisa Heymann, Mark Krenz, Jason R. Lee, Barton Miller, Sean Peisert, "The State of the Scientific Software World: Findings of the 2021 Trusted CI Software Assurance Annual Challenge Interviews", Trusted CI Report, September 29, 2021,

Ayaz Akram, Venkatesh Akella, Sean Peisert, Jason Lowe-Power,, "Enabling Design Space Exploration for RISC-V Secure Compute Environments", Proceedings of the Fifth Workshop on Computer Architecture Research with RISC-V (CARRV), (co-located with ISCA 2021), June 17, 2021,

Ciaran Roberts, Sy-Toan Ngo, Alexandre Milesi, Anna Scaglione, Sean Peisert, Daniel Arnold, "Deep Reinforcement Learning for Mitigating Cyber-Physical DER Voltage Unbalance Attacks”", Proceedings of the 2021 American Control Conference (ACC), May 2021, doi: 10.23919/ACC50511.2021.9482815

Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert, "Performance Analysis of Scientific Computing Workloads on General Purpose TEEs", Proceedings of the 35th IEEE International Parallel & Distributed Processing Symposium (IPDPS), IEEE, May 2021, doi: 10.1109/IPDPS49936.2021.00115

Sean Peisert, "Trustworthy Scientific Computing", Communications of the ACM (CACM), May 2021, doi: 10.1145/3457191

Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael, "Perspectives on the SolarWinds Incident", IEEE Security & Privacy, April 2021, 7-13, doi: 10.1109/MSEC.2021.3051235

Fabio Massacci, Trent Jaeger, Sean Peisert, "SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil?", IEEE Security & Privacy, April 2021, 14-19, doi: 10.1109/MSEC.2021.3050433

2020

Chris Lawson, Jose Manuel Martí, Tijana Radivojevic, Sai Vamshi R. Jonnalagadda, Reinhard Gentz, Nathan J. Hillson, Sean Peisert, Joonhoon Kim, Blake A. Simons, Christopher J. Petzold, Steven W. Singer, Aindrila Mukhopadhyay, Deepti Tanjore, Josh Dunn, Héctor García Martín,, "Machine Learning for Metabolic Engineering: A Review", Metabolic Engineering, November 19, 2020,

Ignacio Losada Carreño, Raksha Ramakrishna, Anna Scaglione, Daniel Arnold, Ciaran Roberts, Sy-Toan Ngo, Sean Peisert, David Pinney, "SODA: An Irradiance-Based Tool to Generate Sub-Minute Solar Power Stochastic Time Series", Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), IEEE, November 2020,

Ciaran Roberts Sy-Toan Ngo, Alexandre Milesi, Sean Peisert, Daniel Arnold, Shammya Saha, Anna Scaglione, Nathan Johnson, Anton Kocheturov, Dmitriy Fradkin, "Deep Reinforcement Learning for DER Cyber-Attack Mitigation", Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), IEEE, November 2020,

Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert, "Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments", arXiv preprint arXiv:2010.13216, October 25, 2020,

Bogdan Copos, Sean Peisert, "Catch Me If You Can: Using Power Analysis to Identify HPC Activity", arXiv:2005.03135 [cs.CR], May 6, 2020,

Ross Gegan, Christina Mao, Dipak Ghosal, Matt Bishop, Sean Peisert, "Anomaly Detection for Science DMZ Using System Performance Data", Proceedings of the 2020 IEEE International Conference on Computing, Networking and Communications (ICNC 2020), Big Island, HI, February 2020, doi: 10.1109/ICNC47757.2020.9049695

Anna Giannakou, Dipankar Dwivedi, Sean Peisert, "A Machine Learning Approach for Packet Loss Prediction in ScienceFlows", Future Generation Computer Systems, January 2020, 102:190-197, doi: 10.1016/j.future.2019.07.053

2019

Reinhard Gentz, Sean Peisert, "An Examination and Survey of Random Bit Flips and Scientific Computing", Trusted CI Report, December 20, 2019,

Amir Teshome Wonjiga, Louis Rilling, Christine Morin, Sean Peisert, "Blockchain as a Trusted Component in Cloud SLA Verification", Proceedings of the International Workshop on Cloud, IoT and Fog Security (CIFS), co-located with the 12th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), Auckland, New Zealand, December 2019, 93-100, doi: 10.1145/3368235.3368872

Mahdi Jamei, Raksha Ramakrishna, Teklemariam Tesfay, Reinhard Gentz, Ciaran Roberts, Anna Scaglione, Sean Peisert, "Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization", IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Communications and Data Analytics in Smart Grid, November 6, 2019, 38(1):180-192, doi: 10.1109/jsac.2019.2951971

Thomas W. Edgar, Aditya Ashok, Garret E. Seppala, K.M. Arthur-Durrett, M. Engels, Reinhard Gentz, Sean Peisert, "An Automated Disruption-Tolerant Key Management Framework for Critical Systems", Journal of Information Warfare, October 8, 2019, 18(4):85-124, doi: https://www.jinfowar.com/journal/volume-18-issue-4/automated-disruption-tolerant-device-authentication-key-management-framework-critical-systems

Reinhard Gentz, Sean Peisert, Joshua Boverhof, Daniel Gunter, "SPARCS: Stream-Processing Architecture applied in Real-time Cyber-physical Security", Proceedings of the 15th IEEE International Conference on e-Science (eScience), San Diego, CA, IEEE, September 2019, doi: 10.1109/eScience.2019.00028

Reinhard Gentz, Héctor García Martin, Edward Baidoo, Sean Peisert, "Workflow Automation in Liquid Chromatography Mass Spectrometry", Proceedings of the 15th IEEE International Conference on e-Science (eScience), San Diego, CA, IEEE, September 2019, doi: 10.1109/eScience.2019.00095

Melissa Stockman, Dipankar Dwivedi, Reinhard Gentz, Sean Peisert, "Detecting Programmable Logic Controller Code Using Machine Learning", International Journal of Critical Infrastructure Protection, September 2019, vol. 26,, doi: 10.1016/j.ijcip.2019.100306

Ciaran Roberts, Anna Scaglione, Mahdi Jamei, Reinhard Gentz, Sean Peisert, Emma M. Stewart, Chuck McParland, Alex McEachern, Daniel Arnold, "Learning Behavior of Distribution System Discrete Control Devices for Cyber-Physical Security", IEEE Transaction on Smart Grid, August 1, 2019, 11(1):749-761, doi: 0.1109/TSG.2019.2936016

Andrew Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert, Scott Russell, Susan Sons, Von Welch, John Zage, "Trusted CI Experiences in Cybersecurity and Service to Open Science", Proceedings of the Conference on Practice and Experience in Advanced Research Computing (PEARC), ACM, July 2019, doi: 10.1145/3332186.3340601

Sean Peisert, Brooks Evans, Michael Liang, Barclay Osborn, David Rusting, David Thurston, Security Without Moats and Walls: Zero-Trust Networking for Enhancing Security in R&E Environments, CENIC Annual Conference, March 19, 2019,

Sean Peisert, Experiences in Building a Mission-Driven Security R&D Program for Science and Energy, Computer Science Colloquium Seminar, University of California, Davis, February 7, 2019,

Sean Peisert, Daniel Arnold, Using Physics to Improve Cybersecurity for the Distribution Grid and Distributed Energy Resources, Naval Postgraduate School, February 5, 2019,

Sean Peisert, Building a Mission-Driven, Applied Cybersecurity R&D Program from Scratch, VISA Research, January 23, 2019,

2018

Anna Giannakou, Daniel Gunter, Sean Peisert, "Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks", Workshop on Innovating the Network for Data-Intensive Science (INDIS), November 11, 2018, doi: 10.1109/INDIS.2018.00004

Sean Peisert, Usable Computer Security and Privacy to Enable and Encourage Data Sharing for Scientific Research, National Academies of Sciences, Engineering, and Medicine Committee on Science, Engineering, Medicine, and Public Policy (COSEMPUP) Meeting, November 8, 2018,

Mahdi Jamei, Anna Scaglione, Sean Peisert, "Low-Resolution Fault Localization Using Phasor Measurement Units with Community Detection", Proceedings of the 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Allborg, Denmark, IEEE, October 29, 2018, doi: 10.1109/SmartGridComm.2018.8587461

Sean Peisert, Ciaran Roberts, Anna Scaglione, Mahdi Jamei, Reinhard Gentz, Charles McParland, Alex McEachren, Galen Rasche, Aaron Snyder, "Supporting Cyber Security of Power Distribution Systems by Detecting Differences Between Real-time Micro-Synchrophasor Measurements and Cyber-Reported SCADA - Final Report", October 15, 2018,

Sean Peisert, Security Concerns of an NRP, Second National Research Platform (NRP) Workshop, August 6, 2018,

"A Holistic Approach to Distribution Grid Intrusion Detection Systems", Ciaran Roberts, Anna Scaglione Sean Peisert,, EnergyCentral, July 18, 2018,

Sean Peisert, Cyber Security Challenges and Opportunities in High-Performance Computing Environments, International Supercomputing Conference, June 26, 2018,

Sean Peisert, Keynote: Cybersecurity for HPC Systems: State of the Art and Looking to the Future, High-Performance Computing Security Workshop, National Institute of Standards and Technology (NIST), March 28, 2018,

Sean Peisert, Eli Dart, William K. Barnett, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, Brian Tierney, "The Medical Science DMZ: An Network Design Pattern for Data-Intensive Medical Science", Journal of the American Medical Informatics Association (JAMIA), March 2018, 25(3):267-274, doi: 10.1093/jamia/ocx104

Sean Peisert, Ciaran Roberts, Cyber Security of Power Distribution Systems Using Micro-Synchrophasor Measurements and Cyber-Reported SCADA, EPRI Power Delivery & Utilization Winter 2018 Program Advisory & Sector Council Meeting, February 7, 2018,

Terry Benzel and Sean Peisert, Selected Papers from the 2017 IEEE Symposium on Security and Privacy [Guest editors' introduction], IEEE Security & Privacy, Pages: 10-11 January 2018, doi: 10.1109/MSP.2018.1331038

EM Stewart, P Top, M Chertkov, D Deka, S Backhaus, A Lokhov, C Roberts, V Hendrix, S Peisert, A Florita, TJ King, MJ Reno, "Integrated multi-scale data analytics and machine learning for the distribution grid", 2017 IEEE International Conference on Smart Grid Communications, SmartGridComm 2017, 2018, 2018-Jan:423--429, doi: 10.1109/SmartGridComm.2017.8340693

2017

David Hatchell, Patrick Miller, Michael Coleman, Sean Peisert, Cybersecurity for the Electricity Grid", Bits & Watts Annual Conference, November 6, 2017,

Sean Peisert, Security in High Performance Computing Environments, Computing Sciences/NERSC Security Seminar, October 5, 2017,

Sean Peisert, Matt Bishop, Ed Talbot,, "A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing", Proceedings of the 2017 New Security Paradigms Workshop (NSPW), Santa Cruz, CA, October 2017, 80-89, doi: 10.1145/3171533.3171536

Sean Peisert, Security and Privacy in Data-Intensive, High-Performance Computing Contexts, Berkeley Institute for Data Science (BIDS), October 2, 2017,

Jonathan Ganz, Sean Peisert, "ASLR: How Robust is the Randomness", Proceedings of the IEEE Secure Development Conference (SecDev), Cambridge, MA, IEEE Computer Society, September 24, 2017, doi: 10.1109/SecDev.2017.19

Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Emma Stewart, Sean Peisert, Chuck McParland, Alex McEachern, "Anomaly Detection Using μPMU Measurements in Distribution Grids", IEEE Transactions on Power Systems, 2017, doi: 10.1109/TPWRS.2017.2764882

Sean Peisert, "Security in High-Performance Computing Environments", Communications of the ACM (CACM), September 2017, 60(9):72-80, doi: 10.1145/3096742

Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Alex McEachern, Emma Stewart, Sean Peisert, Chuck McParland, "Online Thevenin Parameter Tracking Using Synchrophasor Data", Proceedings of the 2017 IEEE Power Engineering Society (PES) General Meeting (GM), Chicago, IL, IEEE, July 2017, doi: 10.1109/PESGM.2017.8273818

Alberto Gonzalez, Jason Leigh, Sean Peisert, Brian Tierney, Edward Balas, Predrag Radulovic, Jennifer M. Schopf, "Big Data and Analysis of Data Transfers for International Research Networks Using NetSage", Proceedings of IEEE BigData Congress 2017, Honolulu, Hawaii, June 2017, doi: 10.1109/BigDataCongress.2017.51

Sean Peisert, Mike Corn, Dewight Kramer, David Rusting, Tye Stallard, The Role of the WAN and the Community to Improve Security, 2017 UC Information Security Symposium,, June 21, 2017,

Galen Rasche, Jenna Goodward, Sheeraz Haji, Gabriel Paun, Sean Peisert, Managing Energy: Role of Data and Security, Prospect Silicon Valley 2017 Innovation and Impact Symposium, June 14, 2017,

Sean Peisert, Greg Bell, Anita Nikolich, Von Welch, Cybersecurity: New Directions for Research and Education - Your own safety is at stake when your neighbor's wall is ablaze. (—Horace), CENIC Annual Conference — The Right Connection ¦ CENIC 2.0, March 22, 2017,

Leon J. Osterweil, Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, Sean Peisert, "A Comprehensive Framework for Using Iterative Analysis to Improve Human-Intensive Process Security: An Election Example", ACM Transactions on Privacy and Security (TOPS), 2017, 20(2), doi: https://doi.org/10.1145/3041041

Sean Peisert, Von Welch, Andrew Adams, Michael Dopheide, Susan Sons, RuthAnne Bevier, Rich LeDuc, Pascal Meunier, Stephen Schwab, and Karen Stocks, Ilkay Altintas, James Cuff, Reagan Moore, Warren Raquel, "Open Science Cyber Risk Profile", February 10, 2017, doi: 2022/21259

Richard LeDuc, Sean Peisert, Karen Stocks, Von Welch, Open Science Cyber Risk Profile (OSCRP), National Science Foundation Cybersecurity Center of Excellence (CCoE) Webinar Series, January 23, 2017,

Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Emma Stewart, Sean Peisert, Chuck McParland, Alex McEachern, "Automated Anomaly Detection in Distribution Grids Using µPMU Measurements", Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS), Electric Energy Systems Track, Resilient Networks Minitrack, IEEE, January 2017, doi: http://hdl.handle.net/10125/41543

S Peisert, R Gentz, J Boverhof, C McParland, S Engle, A Elbashandy, D Gunter, "LBNL Open Power Data", January 2017, doi: 10.21990/C21599

2016

Sean Peisert, Overcoming Security and Privacy Challenges in Computing and Networking in Medical Research Environments, Department of Public Health Sciences, University of California, Davis School of Medicine,, December 14, 2016,

Sean Peisert (moderator), Jill Gemmill, Michael Sinatra, Von Welch, National Cybersecurity Panel, NSF Campus Cyberinfrastructure/ESCC/The Quilt Colocated Meeting, October 20, 2016,

Lee Beausoleil, David Lombard, Angelos Keromytis, Sean Peisert, Panel: HPC Monitoring, NSCI: High-Performance Computing Security Workshop, September 30, 2016,

Sean Peisert, Security Expert on Why HPC Matters - Cybersecurity for HPC Systems: Challenges and Opportunities, NSCI: High-Performance Computing Security Workshop, September 29, 2016,

Mahdi Jamei, Emma Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran Roberts, Alex McEachern, "Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security", IEEE Internet Computing, September 2016, 20(5):18-27, doi: 10.1109/MIC.2016.102

Jonathan Ganz, Matt Bishop, and Sean Peisert, "Security Analysis of Scantegrity, an Electronic Voting System", University of California, Davis, Department of Computer Science Technical Report, June 2016,

Alberto Gonzalez, Jason Leigh, Sean Peisert, Brian Tierney, Andrew Lee, Jennifer M. Schopf, "NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service", Proceedings of TNC16 Networking Conference, Prague, Czech Republic, June 2016,

Sean Peisert, William K. Barnett, Eli Dart, James Cuff, Robert L. Grossman, Edward Balas, Ari Berman, Anurag Shankar, Brian Tierney, "The Medical Science DMZ", Journal of the American Medical Informatics Association (JAMIA), May 2, 2016, 23(6):1199-1201, doi: 10.1093/jamia/ocw032

Sean Peisert, CENIC 2016 Conference Panel: Security in R&E Networks and Campus Environments, 2016 CENIC Annual Conference, March 22, 2016,

Sean Peisert, Computer Security & the Electric Power Grid, 15th Annual ON*VECTOR Photonics Workshop, March 1, 2016,

2015

Jason Adams, Monica Lieng, Brooks Kuhn, Edward Guo, Edik Simonian, Sean Peisert, JP Delplanque, Nick Anderson, "Automated Mechanical Ventilator Waveform Analysis of Patient-Ventilator Asynchrony", CHEST Journal, Pages: 175A October 2015, doi: 10.1378/chest.2281731

PURPOSE: Mechanical ventilation is a life-saving intervention but is associated with adverse effects including ventilator-induced lung injury (VILI). Patient-ventilator asynchrony (PVA) is thought to contribute to VILI, but the study of PVA has been hampered by limited access to the high frequency, large volume data streams produced by modern ventilators and a lack of robust analytics. To address these limitations, we developed an automated pipeline for breath-by-breath analysis of ventilator waveform data.

METHODS: Simulated pressure and flow time series data representing normal breaths and common forms of PVA were generated on PB840 ventilators, collected unobtrusively using small, customized wireless peripheral devices, and transmitted to a networked server for storage and analysis. Two critical care physicians reviewed all waveforms to generate gold standards. Rule-based algorithms were developed to quantify inspiratory and expiratory tidal volumes (TV) and identify PVA subtypes including double trigger and delayed termination asynchrony. Data were split randomly into derivation and validation sets. Algorithm performance was compared to ventilator reported values and clinician annotation.

RESULTS: The mean difference between algorithm-determined and ventilator-reported TVs was 3.1% (99% CI ± 1.36%). Algorithm agreement with clinician annotation was excellent for double trigger PVA and moderate for delayed termination PVA, with Kappa statistics of 0.85 and 0.58, respectively. In the validation data set (n = 492 breaths), double trigger asynchrony was detected with an overall accuracy of 94.1%, sensitivity of 100%, and specificity of 92.8%.

CONCLUSIONS: A pipeline combining wireless ventilator data acquisition and rule-based analytic algorithms informed by the principles of bedside ventilator waveform analysis allows for automated, quantitative breath-by-breath analysis of patient-ventilator interactions.

CLINICAL IMPLICATIONS: We have recently deployed this system in the medical intensive care unit of the UC Davis Medical Center, which will enable further development of mechanical ventilation analytics. We have begun to explore the use of supervised machine learning and dynamic time series modeling to improve the classification of other common types of PVA and of clinical phenotypes associated with respiratory failure. This system will help to better define the epidemiology and clinical impact of PVA and other forms of off-target mechanical ventilation, and may lead to improved decision support and patient outcomes.

Daniel Chung, Matt Bishop, and Sean Peisert, "Distributed Helios - Mitigating Denial of Service Attacks in Online Voting", University of California, Davis, Department of Computer Science Technical Report, October 16, 2015,

Adrian Chavez, William M.S. Stout, and Sean Peisert, "Techniques for the Dynamic Randomization of Network Attributes", Proceedings of the 49th Annual International Carnahan Conference on Security Technology, Taipei, Taiwan, Republic of China, IEEE Press, September 2015, doi: 10.1109/CCST.2015.7389661

Sisi Duan, Jingtao Sun, Sean Peisert, "Towards a Self-Adaptive Middleware for Building Reliable Publish/Subscribe Systems", Proceedings of the 8th International Conference on Internet and Distributed Computing Systems (IDCS), Berkshire, United Kingdom, Springer, September 2015, 157-168, doi: 10.1007/978-3-319-23237-9_14

Sean Peisert, et al., "ASCR Cybersecurity for Scientific Computing Integrity - Research Pathways and Ideas", U.S. Department of Energy Office of Science report, September 2015, LBNL 191105, doi: 10.2172/1236181

Sean Peisert, Security Research Using Cyber-Physical Systems, IT Security Symposium, June 16, 2015,

Sean Peisert, Models of Secure and Private Information Sharing, University of California, San Diego School of Medicine, Division of Biomedical Informatics Seminar Series, April 10, 2015,

Sean Peisert, et al., "ASCR Cybersecurity for Scientific Computing Integrity", U.S. Department of Energy Office of Science report, February 27, 2015, LBNL 6953E, doi: 10.2172/1223021

Georgia Koutsandria, Reinhard Gentz, Mahdi Jamei, Anna Scaglione, Sean Peisert, Chuck McParland, "A real-time testbed environment for cyber-physical security on the power grid", Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, January 1, 2015, 67--78, doi: 10.1145/2808705.2808707

2014

Sisi Duan, Hein Meling, Sean Peisert, Haibin Zhang,, "BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration", Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), Cortina, Italy, Springer, December 2014, 91-106, doi: 10.1007/978-3-319-14472-6_7

Chuck McParland, Sean Peisert, Anna Scaglione, "Monitoring Security of Networked Control Systems: It's the Physics", IEEE Security and Privacy, November 2014, 12(6):32-39, doi: 10.1109/MSP.2014.122

Sean Peisert, Jonathan Margulies, Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction], IEEE Security & Privacy, Pages: 13-14 November 2014, doi: 10.1109/MSP.2014.110

Sean Peisert, Jonathan Margulies, Eric Byres, Paul Dorey, Dale Peterson, Zach Tudor, "Control System Security from the Front Lines (Roundtable)", IEEE Security and Privacy, November 2014, 12(6):55-58, doi: 10.1109/MSP.2014.112

Sisi Duan, Karl Levitt, Hein Meling, Sean Peisert, Haibin Zhang, "Byzantine Fault Tolerance from Intrusion Detection", Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems (SRDS), Nara, Japan, October 2014, 253-264, doi: 10.1109/SRDS.2014.28

Sean Peisert, Security for Computational Infrastructure for Financial Technology, DataLead 2014: Leading the Way in Big Data, Haas School of Business, UC Berkeley, September 30, 2014,

Sean Peisert, Jonathan Margulies, David M. Nicol, Himanshu Khurana, Chris Sawall,, "Designed-in Security for Cyber-Physical Systems (Roundtable)", IEEE Security and Privacy, September 2014, 12(5):9-12, doi: 10.1109/MSP.2014.90

Tiancheng Chang, Sisi Duan, Hein Meling, Sean Peisert, Haibin Zhang, "P2S: A Fault-Tolerant Publish/Subscribe Infrastructure", Proceedings of the 8th ACM International Conference on Distributed Event Based Systems (DEBS), Mumbai, India, ACM Press, May 2014, 189-197, doi: 10.1145/2611286.2611305

Matt Bishop, Heather Conboy, Huong Phan, Borislava I. Simidchieva, George Avrunin, Lori Clarke, Lee Osterweil, Sean Peisert,, "Insider Detection by Process Analysis", Proceedings of the 2014 Workshop on Research for Insider Threat (WRIT), IEEE Computer Society Security and Privacy Workshops, San Jose, CA, IEEE Computer Society, May 18, 2014, doi: 10.1109/SPW.2014.40

Sean Peisert, Challenges in Insider Threat Research, Workshop on Research for Insider Threat (WRIT), IEEE Security and Privacy Workshops (SPW), May 18, 2014,

Peter G. Neumann, Sean Peisert, Marvin Schaefer, "The IEEE Symposium on Security and Privacy, in Retrospect", IEEE Security and Privacy, May 2014, 12(3):15-17, doi: 10.1109/MSP.2014.59

Sisi Duan, Sean Peisert, and Karl Levitt, "hBFT: Speculative Byzantine Fault Tolerance With Minimum Cost", IEEE Transactions on Dependable and Secure Computing (TDSC), March 19, 2014, 12(1):58-70, doi: 10.1109/TDSC.2014.2312331

Masood Parvania, Georgia Koutsandria, Vishak Muthukumary, Sean Peisert, Chuck McParland, Anna Scaglione, "Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems", Proc. of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), January 1, 2014, 774--779, doi: 10.1109/DSN.2014.81

Georgia Koutsandria, Vishak Muthukumar, Masood Parvania, Sean Peisert, Chuck McParland, Anna Scaglione, "A hybrid network IDS for protective digital relays in the power transmission grid", Smart Grid Communications (SmartGridComm), 2014 IEEE International Conference on, January 2014, 908--913, doi: 10.1109/SmartGridComm.2014.7007764

2013

Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert, Christian Probst, "Organizational Processes for Supporting Sustainable Security", Report from Dagstuhl Seminar 120501, November 4, 2013, doi: 10.4230/DagRep.2.12.37

Sean Peisert, Ed Talbot, Tom Kroeger, "Principles of Authentication", Proceedings of the 2013 New Security Paradigms Workshop (NSPW), Banff, Canada, ACM, September 2013, 47-56, doi: 10.1145/2535813.2535819

Sean Peisert and Steven Templeton, "The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report", UC Davis Technical Report, September 4, 2013,

Sean Peisert, Cyber Resilience Metrics, First International Symposium on Resilient Cyber Systems, Resilience Week 2013, August 13, 2013,

Sean Peisert, Health Informatics Minute: Aligning Organizational and Employee Computer Security Goals for Health Informatics, Seventh Annual Health Informatics Graduate Program Conference, March 22, 2013,

Sean Whalen, Sean Peisert, Matt Bishop, "Multiclass Classification of Distributed Memory Parallel Computations", Pattern Recognition Letters (PRL), February 2013, 34(3):322-329, doi: 10.1016/j.patrec.2012.10.007

Sean Peisert, Matt Bishop, "Dynamic, Flexible, and Optimistic Access Control", Working Paper, January 2013,

2012

Xiao Li, Zhifang Wang, Vishak Muthukumar, Anna Scaglione, Chuck McParland, Sean Peisert, "Networked Loads in the Distribution Grid", Proceedings of the 2012 APSIPA Annual Summit and Conference, Hollywood, CA, December 3, 2012,

Sean Peisert, Institute for Information Infrastructure Protection (I3P), 10th Anniversary Event, The National Press Club, October 10, 2012,

Sean Peisert, Ed Talbot, Matt Bishop, "Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems", Proceedings of the 2012 New Security Paradigms Workshop (NSPW), ACM, September 2012, doi: 10.1145/2413296.2413299

Matt Bishop, Sean Peisert, "Security and Elections", IEEE Security & Privacy, September 2012, 10(5):64-67, doi: 10.1109/MSP.2012.127

Sean Whalen, Sophie Engle, Sean Peisert, Matt Bishop, "Network-Theoretic Classification of Parallel Computation Patterns", International Journal of High Performance Computing Applications (IJHPCA), May 2012, 26(2):159-169, doi: 10.1177/1094342012436618

2011

"The Hive Mind Project - Digital Ants for Intrusion Detection", Sean Peisert, DETERlab Testbed Quarterly Newsletter, 2011,

Sean Whalen, Sean Peisert, Matt Bishop, "Network-Theoretic Classification of Parallel Computation Patterns", Proceedings of the First International Workshop on Characterizing Applications for Heterogeneous Exascale Systems (CACHES), Tucson, AZ, IEEE Computer Society, June 4, 2011,

2010

Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen, "A Risk Management Approach to the "Insider Threat"", Insider Threats in Cyber Security, "Advances in Information Security" Series, edited by Christian W. Probst, Jeffrey Hunker, Matt Bishop, (Springer: September 2010) Pages: 115-138 doi: 10.1007/978-1-4419-7133-3_6

Borislava I. Simidchieva, Sophie J. Engle, Michael Clifford, Alicia Clay Jones, Sean Peisert, Matt Bishop, Lori A. Clarke, Leon J. Osterweil,, "Modeling Faults to Improve Election Process Robustness", Proceedings of the 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE), Washinton, D.C., USENIX, August 2010,

Sean Peisert, "Fingerprinting Communication and Computation on HPC Machines", Lawrence Berkeley National Laboratory Technical Report, June 2010, LBNL LBNL-3483E,

Peter G. Neumann, Matt Bishop, Sean Peisert, Marv Schaefer, "Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy", Proceedings of the 31st IEEE Symposium on Security and Privacy, Oakland/Berkeley, CA, IEEE Computer Society, May 2010, 3-13, doi: 10.1109/SP.2010.43

Sean Peisert, Matt Bishop, Keith Marzullo, "What Do Firewalls Protect? An Empirical Study of Firewalls, Vulnerabilities, and Attacks", UC Davis CS Technical Report CSE-2010-8, March 2010,

M Bishop, J Cummins, S Peisert, A Singh, B Bhumiratana, D Agarwal, D Frincke, M Hogarth, "Relationships and data sanitization: A study in scarlet", Proceedings New Security Paradigms Workshop, January 2010, 151--163, doi: 10.1145/1900546.1900567

2009

Sean Peisert, Matt Bishop, Laura Corriss, Steven J. Greenwald, "Quis Custodiet ipsos Custodes? A New Paradigm for Analyzing Security Paradigms", Proceedings of the 2009 New Security Paradigms Workshop (NSPW), The Queen's College, Oxford, United Kingdom, ACM, September 2009, 133-144, doi: 10.1145/1719030.1719041

Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff, David Jefferson, "E-Voting and Forensics: Prying Open the Black Box", Proceedings of the 2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE), Montreal, Canada, USENIX, August 2009,

2008

Matt Bishop, Mark Graff, Candice Hoke, David Jefferson, Sean Peisert, "Resolving the Unexpected in Elections: Election Officials' Options", October 8, 2008,

Sean Peisert, Keynote Address: Computer Forensics In Forensis, Third International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE-2008) (held in conjunction with the 2008 IEEE Symposium on Security and Privacy), May 22, 2008,

Sean Peisert, Matt Bishop, Keith Marzullo, "Computer Forensics In Forensis", ACM Operating Systems Review (OSR), April 2008, 42:112-122, doi: 10.1109/TDSC.2007.1003

2007

Sean Peisert, Matt Bishop, "I'm a Scientist, Not a Philosopher!", IEEE Security and Privacy, July 2007, 5(4):48-51, doi: 10.1109/MSP.2007.84

Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo,, "Analysis of Computer Intrusions Using Sequences of Function Calls", IEEE Transactions on Dependable and Secure Computing (TDSC), April 2007, 4(2):137-150, doi: 10.1109/TDSC.2007.1003

Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo,, "Toward Models for Forensic Analysis", Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), IEEE, April 1, 2007, 3-15, doi: 10.1109/SADFE.2007.23

A Model of Forensic Analysis Using Goal-Oriented Logging, Sean P. Peisert, Ph.D. Dissertation, Dept. of Computer Science and Engineering, University of California, San Diego, March 2007,

2006

Matt Bishop, Sean Peisert, "Your Security Policy is What???", UC Davis CS Technical Report CSE-2006-20, March 2006,

2005

Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo,, "Principles-Driven Forensic Analysis", Proceedings of the 2005 New Security Paradigms Workshop (NSPW), Lake Arrowhead, CA, ACM, September 1, 2005, 85-93, doi: 10.1145/1146269.1146291

Sean Peisert, "Forensics for System Administrators", ;login:, August 2005, 30(4):34-42,