Characterizing GPU Resilience and Impact on AI/HPC Systems.
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, March, 2025
Dependable Classical-Quantum Computer Systems Engineering.
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 33rd USENIX Security Symposium, 2024
Security Testbed for Preempting Attacks against Supercomputing Infrastructure.
Proceedings of the SC24-W: Workshops of the International Conference for High Performance Computing, 2024
Jupyter Notebook Attacks Taxonomy: Ransomware, Data Exfiltration, and Security Misconfiguration.
Proceedings of the SC24-W: Workshops of the International Conference for High Performance Computing, 2024
Post-Quantum Cryptography (PQC) Network Instrument: Measuring PQC Adoption Rates and Identifying Migration Pathways.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2024
Deep Generative Attacks and Countermeasures for Data-Driven Offline Signature Verification.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024
Taxonomy of Fingerprinting Techniques for Evaluation of Smart Grid Honeypot Realism.
Proceedings of the IEEE International Conference on Communications, 2023
Design of a Configurable 16-Electrode Sense and Stimulation Neuromodulation System.
Proceedings of the 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2023
stealthML: Data-driven Malware for Stealthy Data Exfiltration.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Fall Prediction in People with Parkinson's Disease.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022
Investigating Root Causes of Authentication Failures Using a SAML and OIDC Observatory.
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020
On Preempting Advanced Persistent Threats Using Probabilistic Graphical Models.
CoRR, 2019
CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019
TRACTION: an infrastructure for trusted alert sharing and collaborative mitigation.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
SVAuth - A Single-Sign-On Integration Solution with Runtime Verification.
Proceedings of the Runtime Verification - 17th International Conference, 2017
A framework for generation, replay, and analysis of real-world attack variants.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016
Towards an unified security testbed and security analytics framework.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Preemptive intrusion detection: theoretical framework and real-world measurements.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Building Reliable and Secure Virtual Machines Using Architectural Invariants.
IEEE Secur. Priv., 2014
Personalized password guessing: a new security threat.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Preemptive intrusion detection.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Toward a high availability cloud: Techniques and challenges.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012