Search

Your search keyword '"Sean Peisert"' showing total 31 results

Search Constraints

Start Over You searched for: Author "Sean Peisert" Remove constraint Author: "Sean Peisert" Topic computer security Remove constraint Topic: computer security
31 results on '"Sean Peisert"'

Search Results

1. SolarWinds and the Challenges of Patching

2. Perspectives on the SolarWinds Incident

3. Supporting Cyber Security of Power Distribution Systems by Detecting Differences Between Real-time Micro-Synchrophasor Measurements and Cyber-Reported SCADA (Final Report)

4. The medical science DMZ: a network design pattern for data-intensive medical science

5. Blockchain as a Trusted Component in Cloud SLA Verification

6. Trusted CI Experiences in Cybersecurity and Service to Open Science

7. A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing

8. Security in high-performance computing environments

9. ASLR: How Robust Is the Randomness?

10. Monitoring Security of Networked Control Systems: It's the Physics

11. Control Systems Security from the Front Lines

12. Techniques for the dynamic randomization of network attributes

13. Security and Elections

14. The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity

15. The IEEE Symposium on Security and Privacy, in Retrospect

16. Computer forensics in forensis

17. The Medical Science DMZ

18. ByzID: Byzantine Fault Tolerance from Intrusion Detection

19. Designed-in security for cyber-physical systems

20. Principles of authentication

21. Turtles all the way down

22. Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction]

23. A Risk Management Approach to the 'Insider Threat'

24. Quis Custodiet ipsos Custodes?

25. Case Studies of an Insider Framework

26. We have met the enemy and he is us

27. I Am a Scientist, Not a Philosopher!

28. Analysis of Computer Intrusions Using Sequences of Function Calls

29. Toward Models for Forensic Analysis

30. How to Design Computer Security Experiments

31. Principles-Driven Forensic Analysis

Catalog

Books, media, physical & digital resources