Search

Your search keyword '"Sean Peisert"' showing total 75 results

Search Constraints

Start Over You searched for: Author "Sean Peisert" Remove constraint Author: "Sean Peisert" Language undetermined Remove constraint Language: undetermined
75 results on '"Sean Peisert"'

Search Results

2. SoDa: An Irradiance-Based Synthetic Solar Data Generation Tool

8. Adam-based Augmented Random Search for Control Policies for Distributed Energy Resource Cyber Attack Mitigation

9. Perspectives for self-driving labs in synthetic biology

10. Differentially Private K-means Clustering Applied to Meter Data Analysis and Synthesis

14. Deep Reinforcement Learning for Mitigating Cyber-Physical DER Voltage Unbalance Attacks

15. Performance Analysis of Scientific Computing Workloads on General Purpose TEEs

16. Learning from learning machines: improving the predictive power of energy-water-land nexus models with insights from complex measured and simulated data

17. Perspectives on the SolarWinds Incident

18. Lyapunov stability of smart inverters using linearized distflow approximation

19. Trustworthy Scientific Computing

20. Machine learning for metabolic engineering: A review

21. Supporting Cyber Security of Power Distribution Systems by Detecting Differences Between Real-time Micro-Synchrophasor Measurements and Cyber-Reported SCADA (Final Report)

22. Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments

23. Anomaly Detection for Science DMZs Using System Performance Data

24. Learning Behavior of Distribution System Discrete Control Devices for Cyber-Physical Security

25. Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization

26. Anomaly Detection Using Optimally Placed <tex-math notation='LaTeX'>$\mu \text{PMU}$ </tex-math> Sensors in Distribution Grids

27. The medical science DMZ: a network design pattern for data-intensive medical science

28. Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes

29. Workflow automation in liquid chromatography mass spectrometry

30. Detecting control system misbehavior by fingerprinting programmable logic controller functionality

31. SPARCS: Stream-Processing Architecture applied in Real-time Cyber-physical Security

32. Trusted CI Experiences in Cybersecurity and Service to Open Science

33. Low-Resolution Fault Localization Using Phasor Measurement Units with Community Detection

34. Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks

35. Integrated Multi-Scale Data Analytics and Machine Learning for the Distribution Grid

36. A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing

37. Security in high-performance computing environments

38. ASLR: How Robust Is the Randomness?

39. Online Thevenin parameter tracking using synchrophasor data

40. Automated Anomaly Detection in Distribution Grids Using uPMU Measurements

41. Monitoring Security of Networked Control Systems: It's the Physics

42. Control Systems Security from the Front Lines

43. Selected Papers from the 2017 IEEE Symposium on Security and Privacy

44. Multiclass classification of distributed memory parallel computations

45. Techniques for the dynamic randomization of network attributes

46. Security and Elections

47. The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity

48. The IEEE Symposium on Security and Privacy, in Retrospect

49. Computer forensics in forensis

50. The Medical Science DMZ

Catalog

Books, media, physical & digital resources