Gabriel A. Weaver

According to our database1, Gabriel A. Weaver authored at least 18 papers between 2009 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Simulating Energy and Security Interactions in Semiconductor Manufacturing: Insights from the Intel Minifab Model.
Proceedings of the Winter Simulation Conference, 2022

2021
A Data Processing Pipeline For Cyber-Physical Risk Assessments Of Municipal Supply Chains.
Proceedings of the Winter Simulation Conference, 2021

Scientific Data Management for Interconnected Critical Infrastructure Systems.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2021

2020
Coastal Infrastructure Monitoring through Heterogeneous Autonomous Vehicles.
Proceedings of the Fourth IEEE International Conference on Robotic Computing, 2020

2019
Stakeholder-Centric Analyses of Simulated Shipping Port Disruptions.
Proceedings of the 2019 Winter Simulation Conference, 2019

2018
Cyber-Physical simulation and Optimal Mitigation for Shipping Port Operations.
Proceedings of the 2018 Winter Simulation Conference, 2018

2016
Cyber-Physical models for power grid security analysis: 8-substation case.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

A Quantitative Methodology for Security Monitor Deployment.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure.
Proceedings of the Quantitative Evaluation of Systems, 12th International Conference, 2015

Cyber-Physical Topology Language: Definition, Operations, and Application.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

2013
Security-Policy Analysis with eXtended Unix Tools.
PhD thesis, 2013

An Actor-centric, Asset-Based Monitor Deployment Model for Cloud Computing.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

Toward a cyber-physical topology language: applications to NERC CIP audit.
Proceedings of the SEGS'13, 2013

2012
XUTools: Unix Commands for Processing Next-Generation Structured Text.
Proceedings of the Strategies, 2012

2011
Using Hierarchical Change Mining to Manage Network Security Policy Evolution.
Proceedings of the USENIX Workshop on Hot Topics in Management of Internet, 2011

2010
Computational techniques for increasing PKI policy comprehension by human analysts.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

2009
A Computational Framework for Certificate Policy Operations.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009


  Loading...