Saurabh Bagchi
Orcid: 0000-0002-4239-5632Affiliations:
- Purdue University, West Lafayette, USA
According to our database1,
Saurabh Bagchi
authored at least 268 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography.
Dataset, May, 2024
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography.
Dataset, April, 2024
Dynamic DAG-Application Scheduling for Multi-Tier Edge Computing in Heterogeneous Networks.
CoRR, 2024
Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey.
CoRR, 2024
CoRR, 2024
Loki: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
SensorBFT: Fault-Tolerant Target Localization Using Voronoi Diagrams and Approximate Agreement.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
RECON: Training-Free Acceleration for Text-to-Image Synthesis with Retrieval of Concept Prompt Trajectories.
Proceedings of the Computer Vision - ECCV 2024, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Leak and Learn: An Attacker's Cookbook to Train Using Leaked Data from Federated Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon <i>without</i> Threshold Cryptography.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Virtuoso: Energy- and Latency-aware Streamlining of Streaming Videos on Systems-on-Chips.
ACM Trans. Design Autom. Electr. Syst., 2023
Anomaly Detection and Inter-Sensor Transfer Learning on Smart Manufacturing Datasets.
Sensors, 2023
HashRand: Efficient Asynchronous Random Beacon without Threshold Cryptographic Setup.
IACR Cryptol. ePrint Arch., 2023
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions.
CoRR, 2023
Secure Aggregation in Federated Learning is not Private: Leaking User Data at Large Scale through Model Modification.
CoRR, 2023
An Open Dataset of Sensor Data from Soil Sensors and Weather Stations at Production Farms.
CoRR, 2023
Proceedings of the 24th International Middleware Conference, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
How to Learn Collaboratively - Federated Learning to Peer-to-Peer Learning and What's at Stake.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
A Circuit Designer's Perspective on Transistor Modelling Challenges for 6G, Fiberoptics, and Quantum Computing ICs.
Proceedings of the IEEE BiCMOS and Compound Semiconductor Integrated Circuits and Technology Symposium, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
ApproxNet: Content and Contention-Aware Video Object Classification System for Embedded Clients.
ACM Trans. Sens. Networks, 2022
Distributed State Estimation Over Time-Varying Graphs: Exploiting the Age-of-Information.
IEEE Trans. Autom. Control., 2022
Proc. ACM Meas. Anal. Comput. Syst., 2022
Anomaly Detection and Inter-Sensor Transfer Learning on Smart Manufacturing Datasets.
CoRR, 2022
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022
TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
An Automated Approach to Re-Hosting Embedded Firmware by Removing Hardware Dependencies.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2022
LiteReconfig: cost and content aware reconfiguration of video object detection systems for mobile GPUs.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022
2021
IEEE Trans. Signal Process., 2021
IEEE Internet Things J., 2021
Context-Aware Collaborative Intelligence With Spatio-Temporal In-Sensor-Analytics for Efficient Communication in a Large-Area IoT Testbed.
IEEE Internet Things J., 2021
TESSERACT: Gradient Flip Score to Secure Federated Learning Against Model Poisoning Attacks.
CoRR, 2021
Anomaly Detection through Transfer Learning in Agriculture and Manufacturing IoT Systems.
CoRR, 2021
Proceedings of the 2021 USENIX Annual Technical Conference, 2021
HIOA-CPS: Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical Systems.
Proceedings of the IEEE Security and Privacy Workshops, 2021
Benchmarking Video Object Detection Systems on Embedded Devices under Resource Contention.
Proceedings of the EMDL@MobiSys 2021: Proceedings of the 5th International Workshop on Embedded and Mobile Deep Learning, 2021
Ramps: Next Generation Platform for Real Time and Resilient IoT Analytics using MmWave and Programmable Switches.
Proceedings of the DIDL '21: Proceedings of the Fifth Workshop on Distributed Infrastructures for Deep Learning 2021, 2021
The Effect of Behavioral Probability Weighting in a Simultaneous Multi-Target Attacker-Defender Game.
Proceedings of the 2021 European Control Conference, 2021
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs.
IEEE Trans. Control. Netw. Syst., 2020
Vision Paper: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures.
IEEE Open J. Comput. Soc., 2020
IEEE Internet Things J., 2020
Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical Systems.
CoRR, 2020
I-BOT: Interference-Based Orchestration of Tasks for Dynamic Unmanaged Edge Computing.
CoRR, 2020
CoRR, 2020
BASCPS: How does behavioral decision making impact the security of cyber-physical systems?
CoRR, 2020
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
OPTIMUSCLOUD: Heterogeneous Configuration Optimization for Distributed Databases in the Cloud.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020
Proactive privacy-preserving proximity prevention through bluetooth transceivers: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020
Feature Shift Detection: Localizing Which Features Have Shifted via Conditional Distribution Tests.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
Proceedings of the IEEE International Symposium on Multimedia, 2020
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020
AppStreamer: Reducing Storage Requirements of Mobile Games through Predictive Streaming.
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the 59th IEEE Conference on Decision and Control, 2020
The Effect of Behavioral Probability Weighting in a Sequential Defender-Attacker Game.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020
2019
Grand Challenges of Resilience: Autonomous System Resilience through Design and Runtime Measures.
CoRR, 2019
CoRR, 2019
MG-RAST version 4 - lessons learned from a decade of low-budget ultra-high-throughput metagenome analysis.
Briefings Bioinform., 2019
Briefings Bioinform., 2019
Resilient distributed state estimation with mobile agents: overcoming Byzantine adversaries, communication losses, and intermittent measurements.
Auton. Robots, 2019
SOPHIA: Online Reconfiguration of Clustered NoSQL Databases for Time-Varying Workloads.
Proceedings of the 2019 USENIX Annual Technical Conference, 2019
Proceedings of the High Performance Computing - 34th International Conference, 2019
Proceedings of the 4th Workshop on Middleware for Edge Clouds & Cloudlets, 2019
XSTRESSOR : Automatic Generation of Large-Scale Worst-Case Test Inputs by Inferring Path Conditions.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019
Proceedings of the ACM International Conference on Supercomputing, 2019
Proceedings of the Advances in Information Retrieval, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
SimVecs: Similarity-Based Vectors for Utterance Representation in Conversational AI Systems.
Proceedings of the 23rd Conference on Computational Natural Language Learning, 2019
Protecting Assets with Heterogeneous Valuations under Behavioral Probability Weighting.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019
Finite-Time Distributed State Estimation over Time-Varying Graphs: Exploiting the Age-of-Information.
Proceedings of the 2019 American Control Conference, 2019
The Impacts of Behavioral Probability Weighting on Security Investments in Interdependent Systems.
Proceedings of the 2019 American Control Conference, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices.
IEEE Internet Comput., 2018
ATHENA: Automated Tuning of Genomic Error Correction Algorithms using Language Models.
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Pythia: Improving Datacenter Utilization via Precise Contention Prediction for Multiple Co-located Workloads.
Proceedings of the 19th International Middleware Conference, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Minerva: A reinforcement learning-based technique for optimal scheduling and bottleneck detection in distributed factory operations.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018
2017
MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks.
EAI Endorsed Trans. Security Safety, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and Applications, 2017
TopHat : Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined Networks.
Proceedings of the Security and Privacy in Communication Networks, 2017
Snowpack: efficient parameter choice for GPU kernels via static analysis and statistical prediction.
Proceedings of the 8th Workshop on Latest Advances in Scalable Algorithms for Large-Scale Systems, 2017
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017
Rafiki: a middleware for parameter tuning of NoSQL datastores for dynamic metagenomics workloads.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017
Proceedings of the ACM Workshop on Fault-Tolerance for HPC at Extreme Scale, 2017
RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017
Position statements from panelists: Ubiquitous sensing and privacy: Can the twains meet?
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017
Position statements from panelists: Big data in IoT - Academic hype or industrial reality?
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017
TATHYA: A Multi-Classifier System for Detecting Check-Worthy Statements in Political Debates.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
Proceedings of the 2017 International Symposium on Code Generation and Optimization, 2017
Scalable Genomic Assembly through Parallel <i>de Bruijn</i> Graph Construction for Multiple K-mers.
Proceedings of the 8th ACM International Conference on Bioinformatics, 2017
2016
IEEE Trans. Mob. Comput., 2016
Sirius: Neural Network Based Probabilistic Assertions for Detecting Silent Data Corruption in Parallel Programs.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016
TANGO: Toward a More Reliable Mobile Streaming through Cooperation between Cellular Network and Mobile Devices.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016
Chameleon: defending secret information from eavesdropping over physical environment.
Proceedings of the International Conference on Networking Systems and Security, 2016
Video through a crystal ball: effect of bandwidth prediction quality on adaptive streaming in mobile environments.
Proceedings of the 8th International Workshop on Mobile Video, 2016
Proceedings of the 2016 IEEE International Symposium on Software Reliability Engineering Workshops, 2016
SARVAVID: A Domain Specific Language for Developing Scalable Computational Genomics Applications.
Proceedings of the 2016 International Conference on Supercomputing, 2016
Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage.
Proceedings of the Eleventh European Conference on Computer Systems, 2016
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016
2015
Diagnosis of Performance Faults in LargeScale MPI Applications via Probabilistic Progress-Dependence Inference.
IEEE Trans. Parallel Distributed Syst., 2015
Commun. ACM, 2015
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015
Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium Workshop, 2015
ICE: An Integrated Configuration Engine for Interference Mitigation in Cloud Services.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015
Do specialized distributed frameworks for bioinformatics applications obtain better performance over generic ones?
Proceedings of the 6th ACM Conference on Bioinformatics, 2015
Proceedings of the 6th ACM Conference on Bioinformatics, 2015
Proceedings of the 2015 International Conference on Parallel Architectures and Compilation, 2015
2014
J. Grid Comput., 2014
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Proceedings of the International Conference for High Performance Computing, 2014
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014
Proceedings of the 15th International Middleware Conference, 2014
Proceedings of the 11th International Conference on Autonomic Computing, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
2013
McrEngine: A scalable checkpointing system using data-aware aggregation and compression.
Sci. Program., 2013
DISA: Detection and isolation of sneaky attackers in locally monitored multi-hop wireless networks.
Secur. Commun. Networks, 2013
Distributed mobility management for efficient video delivery over all-IP mobile networks: Competing approaches.
IEEE Netw., 2013
An optimization framework for monitoring multi-channel multi-radio wireless mesh networks.
Ad Hoc Networks, 2013
A delay-bounded event-monitoring and adversary-identification protocol in resource-constraint sensor networks.
Ad Hoc Networks, 2013
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013
Toward optimal sniffer-channel assignment for reliable monitoring in multi-channel wireless networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2013
Characterizing configuration problems in Java EE application servers: An empirical study with GlassFish and JBoss.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013
WuKong: automatically detecting and localizing bugs that manifest at large system scales.
Proceedings of the 22nd International Symposium on High-Performance Parallel and Distributed Computing, 2013
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 2013
Lilliput meets brobdingnagian: Data center systems management through mobile devices.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the 2013 International Workshop on Data Management & Analytics for Healthcare, 2013
2012
Mitigating the Effects of Software Component Shifts for Incremental Reprogramming of Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012
Multi-armed Bandit Congestion Control in Multi-hop Infrastructure Wireless Mesh Networks.
Proceedings of the 20th IEEE International Symposium on Modeling, 2012
Distributed online channel assignment toward optimal monitoring in multi-channel wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Proceedings of the International Conference on Parallel Architectures and Compilation Techniques, 2012
2011
ACM Trans. Sens. Networks, 2011
IEEE Trans. Mob. Comput., 2011
Comput. Networks, 2011
Dangers and Joys of Stock Trading on the Web: Failure Characterization of a Three-Tier Web Service.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011
Aveksha: a hardware-software approach for non-intrusive tracing and profiling of wireless embedded systems.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks.
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the Conference on High Performance Computing Networking, 2011
Dependence-based multi-level tracing and replay for wireless sensor networks debugging.
Proceedings of the ACM SIGPLAN/SIGBED 2011 conference on Languages, 2011
Vrisha: using scaling properties of parallel programs for bug detection and localization.
Proceedings of the 20th ACM International Symposium on High Performance Distributed Computing, 2011
2010
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks.
Ad Hoc Networks, 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
2009
Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping.
Ad Hoc Networks, 2009
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009
Proceedings of the ACM/IEEE Conference on High Performance Computing, 2009
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009
Proceedings of the Middleware 2009, ACM/IFIP/USENIX, 10th International Middleware Conference, Urbana, IL, USA, November 30, 2009
Proceedings of the Middleware 2008, 2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Hermes: Fast and Energy Efficient Incremental Code Updates for Wireless Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
2008
ACM Trans. Sens. Networks, 2008
IEEE Trans. Dependable Secur. Comput., 2008
Ad Hoc Networks, 2008
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008
SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor Networks.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
2007
IEEE Trans. Dependable Secur. Comput., 2007
Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking.
ACM Trans. Auton. Adapt. Syst., 2007
Prediction of Resource Availability in Fine-Grained Cycle Sharing Systems Empirical Evaluation.
J. Grid Comput., 2007
Comput. Networks, 2007
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks.
Comput. Networks, 2007
Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks.
Ad Hoc Networks, 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007
Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the 16th International Symposium on High-Performance Distributed Computing (HPDC-16 2007), 2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
2006
IEEE Trans. Dependable Secur. Comput., 2006
Proceedings of the IEEE International Conference on Sensor Networks, 2006
Proceedings of the 24th International Conference on Computer Design (ICCD 2006), 2006
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
2005
LRRM: A Randomized Reliable Multicast Protocol for Optimizing Recovery Latency and Buffer Utilization.
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
2004
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004
Failure Handling in a Reliable Multicast Protocol for Improving Buffer Utilization and Accommodating Heterogeneous Receivers.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004
Analysis and Evaluation of Topological and Application Characteristics of Unreliable Mobile Wireless Ad-hoc Network.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
DIWANS: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
2003
Open Source Software - A Recipe for Vulnerable Software, or The Only Way to Keep the Bugs and the Bad Guys Out?
Proceedings of the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), 2003
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
2001
Hierarchical Error Detection in a Software Implemented Fault Tolerance (Sift) Environment
PhD thesis, 2001
Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001
Dependency Analysis in Distributed Systems using Fault Injection: Application to Problem Determination in an e-commerce Environment.
Proceedings of the Operations & Management, 2001
A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001
2000
Hierarchical Error Detection in a Software Implemented Fault Tolerance (SIFT) Environment.
IEEE Trans. Knowl. Data Eng., 2000
1999
IEEE Trans. Parallel Distributed Syst., 1999
1998
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
Proceedings of the 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 1998
1997
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997