Saman Aliari Zonouz

Former group member (Ph.D., 2011).
LinkedIn profile

Publications with the Performability Engineering Research Group

A Kalman-based Coordination for Hierarchical State Estimation: Algorithm and Analysis.
S. A. Zonouz and W. H. Sanders. (07ZON01)
Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS ’08), Waikoloa, Hawaii, January 7-10, 2008, unpaginated. [IEEE Xplore entry]

RRE: A Game-Theoretic Intrusion Response and Recovery Engine.
S. A. Zonouz, H. Khurana, W. H. Sanders, and T. M. Yardley. (08ZON01)
Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009), Estoril, Lisbon, Portugal, June 29-July 2, 2009, pp. 439-448. [IEEE Xplore entry]

Cost-aware Systemwide Intrusion Defense via Online Forensics and On-demand Detector Deployment.
S. A. Zonouz, K. R. Joshi, and W. H. Sanders. (10ZON03)
Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), Chicago, Illinois, Oct. 4, 2010, pp. 71-74. [ACM DOI: http://dx.doi.org/10.1145/1866898.1866910]

Managing Business Health in the Presence of Malicious Attacks.
S. A. Zonouz, A. Sharma, H. V. Ramasamy, Z. T. Kalbarczyk, B. Pfitzmann, K. McAuliffe, R. K. Iyer, W. H. Sanders, and E. Cope. (11ZON04)
Proceedings of the IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), Hong Kong, China, June 27-30, 2011, pp. 9-14. [IEEE Xplore entry]

FloGuard: Cost-aware Systemwide Intrusion Defense via Online Forensics and On-demand IDS Deployment.
S. A. Zonouz, K. R. Joshi, and W. H. Sanders. (11ZON01)
Proceedings of the 30th International Conference on Computer Safety, Reliability and Security (SAFECOMP 2011), Naples, Italy, Sept. 19-22, 2011, pp. 338-354; Lecture Notes in Computer Science (LNCS), vol. 6894, Springer, 2011.

Game-Theoretic Intrusion Response and Recovery.
S. A. Zonouz. (11ZON02)
Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2011.

SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures.
S. Zonouz, K. M. Rogers, R. Berthier, R. B. Bobba, W. H. Sanders, and T. J. Overbye. (12ZON01)
IEEE Transactions on Smart Grid, vol. 3, no. 4, December 2012, pp. 1790-1799. [IEEE Xplore entry]

SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures.
S. Zonouz, C. M. Davis, K. R. Davis, R. Berthier, R. B. Bobba, and W. H. Sanders. (13ZON01)
IEEE Transactions on Smart Grid, vol. 5, no. 1, January 2014, pp. 3-13. [IEEE Xplore entry]

RRE: A Game-Theoretic Intrusion Response and Recovery Engine.
S. A. Zonouz, H. Khurana, W. H. Sanders, and T. M. Yardley. (13ZON02)
IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, February 2014, pp. 395-406. [IEEE Xplore entry]

Seclius: An Information Flow-based, Consequence-centric Security Metric.
S. A. Zonouz, R. Berthier, H. Khurana, W. H. Sanders, and T. Yardley. (11ZON03)
IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 2, Feb. 2015, pp. 562-573. [IEEE Xplore entry]


COPYRIGHT NOTICES: The above electronic files are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

The following copyright notice applies to all of the above items that appear in IEEE publications: “Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE.”

With respect to items published by the ACM: Items are © by the authors listed and by the ACM, in the year listed on each item. The files posted here are the authors’ versions of the work. They are posted here for your personal use and are not for redistribution. The definitive Version of Record was published as indicated in the bibliographic citations provided, and is available from the ACM Digital Library from the ACM Digital Object Identifier listed for each publication.