University of Illinois
Coordinated Science Laboratory
1308 West Main Street
Urbana, IL 61801 USA
mjrausc2 at illinois.edu
Publications with the Performability Engineering Research Group
A Comparison of Different Intrusion Detection Approaches in an Advanced Metering Infrastructure Network Using ADVISE.
M. Rausch, B. Feddersen, K. Keefe, and W. H. Sanders. (16RAU01)
Proceedings of the 13th International Conference on Quantitative Evaluation of Systems (QEST 2016), Quebec City, Canada, August 23-25, 2016, Lecture Notes in Computer Science vol. 9826, Springer, pp. 279-294. [The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-43425-4_19]
Determining Cost-Effective Intrusion Detection Approaches for an Advanced Metering Infrastructure Deployment Using ADVISE.
M. J. Rausch. (16RAU02)
Master’s Thesis, University of Illinois at Urbana-Champaign, 2016.
REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks.
V. Badrinath Krishna, M. Rausch, B. E. Ujcich, I. Gupta, and W. H. Sanders. (16BAD01)
Proceedings of the 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, Colorado, June 26-29, 2017, pp. 321-332. [IEEE Xplore entry]
Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options. [Springer SharedIt link]
M. Rausch, K. Keefe, B. Feddersen, and W. H. Sanders. (17RAU02)
In Critical Information Infrastructures Security: 12th International Conference, CRITIS 2017, Lucca, Italy, October 9-13, 2017, Revised Selected Papers (G. D’Agostino and A. Scala, Eds.), pp. 156-167. Security and Cryptology, vol. 10707. Springer International Publishing, 2018.
Modeling Humans: A General Agent Model for the Evaluation of Security.
M. Rausch, A. Fawaz, K. Keefe, and W. H. Sanders. (18RAU01)
Proceedings of the 15th International Conference on Quantitative Evaluation of SysTems (QEST 2018), Beijing, China, Sept. 4-7, 2018 (A. McIver and A. Horvath, Eds.), pp. 373-388. Lecture Notes in Computer Science, vol. 11024. Cham: Springer, 2018. [The final publication is available at link.springer.com: Springer Link entry]
An Ontology Framework for Generating Discrete-Event Stochastic Models.
K. Keefe, B. Feddersen, M. Rausch, R. Wright, and W. H. Sanders. (18KEE02)
Proceedings of the 15th European Performance Engineering Workshop (EPEW 2018), Paris, France, Oct. 29-30, 2018 (R. Bakhshi, P. Ballarini, B. Barbot, H. Castel-Taleb, and A. Remke, Eds.), pp. 173-189. Lecture Notes in Computer Science, vol. 11178. Cham: Springer, 2018. [The final publication is available at link.springer.com: Springer Link entry]
Peer-to-Peer Detection of DoS Attacks on City-Scale IoT Mesh Networks.
M. J. Rausch, V. Badrinath Krishna, P. Gu, R. Chandra, B. Feddersen, A. Fawaz, and W. H. Sanders. (18RAU02)
Proceedings of the 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (IEEE SmartGridComm), Aalborg, Denmark, October 29-31, 2018, pp. 1-6. [IEEE Xplore entry]
Sensitivity Analysis and Uncertainty Quantification of State-Based Discrete-Event Simulation Models through a Stacked Ensemble of Metamodels.
M. Rausch and W. H. Sanders. (20RAU01)
Proceedings of the 17th International Conference on Quantitative Evaluation of SysTems (QEST), online virtual conference, August 31-September 3, 2020, pp. 276-293. Lecture Notes in Computer Science, vol. 12289. Cham: Springer, 2020. [The final publication is available at link.springer.com: Springer Link entry]
Stacked Metamodels for Sensitivity Analysis and Uncertainty Quantification of AMI Models.
M. Rausch and W. H. Sanders. (20RAU02)
Proceedings of the 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), online virtual conference, November 11-13, 2020, p. 1-7. [IEEE Xplore entry]
Evaluating the Effectiveness of Metamodeling in Emulating Quantitative Models.
M. Rausch and W. H. Sanders. (21RAU01)
Proceedings of the 18th International Conference on Quantitative Evaluation of SysTems (QEST), Paris, France, August 23-27, 2021, pp. 127-145. Lecture Notes in Computer Science no. 12846, Cham: Springer, 2021. [Springer Link entry.]
Addressing Challenges to Quantitative Security Modeling.
M. Rausch. (21RAU02)
Ph.D. Dissertation, University of Illinois Urbana-Champaign, 2021.
COPYRIGHT NOTICES: The above electronic files are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
The following copyright notice applies to all of the above items that appear in IEEE publications: “Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE.”
With respect to items published by the ACM: Items are © by the authors listed and by the ACM, in the year listed on each item. The files posted here are the authors’ versions of the work. They are posted here for your personal use and are not for redistribution. The definitive Version of Record was published as indicated in the bibliographic citations provided, and is available from the ACM Digital Library from the ACM Digital Object Identifier listed for each publication.