Formerly a postdoc in the PERFORM group.
University of Illinois
Coordinated Science Laboratory
1308 West Main Street
Urbana, IL 61801 USA
gweaver at illinois.edu
Publications with the Performability Engineering Research Group
Toward a Cyber-Physical Topology Language: Applications to NERC CIP Audit.
G. A. Weaver, C. Cheh, E. J. Rogers, W. H. Sanders, and D. Gammel. (13WEA01)
Proceedings of the 1st ACM Workshop on Smart Energy Grid Security (SEGS), Berlin, Germany, Nov. 8, 2013, pp. 93-104. [ACM: http://dx.doi.org/10.1145/2516930.2516934]
An Actor-Centric, Asset-Based Monitor Deployment Model for Cloud Computing.
U. Thakore, G. A. Weaver, and W. H. Sanders. (13THA01)
Proceedings of the 6th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2013), Dresden, Germany, Dec. 9-12, 2013, pp. 311-312. [IEEE Xplore entry]
PCA-Based Method for Detecting Integrity Attacks on
Advanced Metering Infrastructure.
V. Badrinath Krishna, G. A. Weaver, and W. H.
Proceedings of the 12th
International Conference on Quantitative Evaluation of Systems
(QEST), Madrid, Spain, Sept. 1-3, 2015, Lecture Notes in Computer Science vol. 9259, pp. 70-85, Springer. [The final publication is available at link.springer.com: Springer Link entry]
Cyber-Physical Topology Language: Definition, Operations, and Application.
C. Cheh, G. A. Weaver, and W. H. Sanders. (15CHE02)
Proceedings of the 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, Nov. 18-20, 2015, pp. 60-69. [IEEE Xplore entry]
F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids.
V. Badrinath Krishna, K. Lee, G. A. Weaver, R. K. Iyer, and W. H. Sanders. (15BAD04)
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Toulouse, France, June 28-July 1, 2016, pp. 407-418. [IEEE Xplore entry]
A Quantitative Methodology for Security Monitor Deployment.
U. Thakore, G. A. Weaver, and W. H. Sanders. (15THA03)
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Toulouse, France, June 28-July 1, 2016, pp. 1-12. [IEEE Xplore entry]
COPYRIGHT NOTICES: The above electronic files are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
The following copyright notice applies to all of the above items that appear in IEEE publications: "Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE."