Data-Driven Application-Oriented Reliability Model of a High-Performance Computing System | 1 | 0.39 | 2022 |
Delay sensitivity-driven congestion mitigation for HPC systems | 0 | 0.34 | 2021 |
Improved GPU Implementations of the Pair-HMM Forward Algorithm for DNA Sequence Alignment | 0 | 0.34 | 2021 |
Crimson: An Open-Source Software Framework For Cardiovascular Integrated Modelling And Simulation | 0 | 0.34 | 2021 |
BayesPerf: minimizing performance monitoring errors using Bayesian statistics | 0 | 0.34 | 2021 |
A Dynamic Human-in-the-loop Recommender System for Evidence-based Clinical Staging of COVID-19. | 0 | 0.34 | 2020 |
ML-Driven Malware that Targets AV Safety | 1 | 0.36 | 2020 |
Electrophysiological Correlates Of Brain Health Help Diagnose Epilepsy And Lateralize Seizure Focus | 0 | 0.34 | 2020 |
The Mystery of the Failing Jobs: Insights from Operational Data from Two University-Wide Computing Systems | 0 | 0.34 | 2020 |
Inductive-bias-driven Reinforcement Learning For Efficient Schedules in Heterogeneous Clusters. | 0 | 0.34 | 2020 |
Challenges and Opportunities in the Detection of Safety-Critical Cyberphysical Attacks | 0 | 0.34 | 2020 |
Recommendations for performance optimizations when using GATK3.8 and GATK4. | 0 | 0.34 | 2019 |
RAINCOAT: RAndomization of Network Communication in Power Grid Cyber INfrastructure to Mislead Attackers | 1 | 0.35 | 2019 |
A Computationally Efficient Model for Predicting Successful Memory Encoding Using Machine-Learning-based EEG Channel Selection | 0 | 0.34 | 2019 |
A Study of Network Congestion in Two Supercomputing High-Speed Interconnects | 1 | 0.34 | 2019 |
Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field Data | 9 | 0.91 | 2018 |
Indirect cyber attacks by perturbation of environment control: a data driven attack model: poster. | 0 | 0.34 | 2018 |
Impact of Malicious SCADA Commands on Power Grids’ Dynamic Responses | 0 | 0.34 | 2018 |
Self-Healing Attack-Resilient PMU Network for Power System Operation. | 7 | 0.63 | 2018 |
Characterizing Supercomputer Traffic Networks Through Link-Level Analysis | 1 | 0.36 | 2018 |
Attack Induced Common-Mode Failures on PLC-Based Safety System in a Nuclear Power Plant: Practical Experience Report. | 0 | 0.34 | 2017 |
Prediction Of Adenocarcinoma Development Using Game Theory | 0 | 0.34 | 2017 |
Failure Diagnosis for Distributed Systems Using Targeted Fault Injection. | 8 | 0.55 | 2017 |
Svauth - A Single-Sign-On Integration Solution With Runtime Verification | 0 | 0.34 | 2017 |
Optimal False Data Injection Attack against Automatic Generation Control in Power Grids | 10 | 0.59 | 2016 |
Efficient and Scalable Workflows for Genomic Analyses. | 1 | 0.43 | 2016 |
A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures. | 3 | 0.41 | 2016 |
Game Theory with Learning for Cyber Security Monitoring | 7 | 0.52 | 2016 |
Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges | 31 | 1.30 | 2015 |
Resilience of Medical Devices and Systems | 0 | 0.34 | 2015 |
Systems-theoretic Safety Assessment of Robotic Telesurgical Systems. | 10 | 0.66 | 2015 |
Preemptive intrusion detection | 2 | 0.42 | 2014 |
Characterization of operational failures from a business data processing SaaS platform | 9 | 0.53 | 2014 |
AHEMS: Asynchronous Hardware-Enforced Memory Safety | 0 | 0.34 | 2014 |
Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants. | 8 | 0.64 | 2014 |
Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol | 36 | 1.97 | 2013 |
Semantic security analysis of SCADA networks to detect malicious control commands in power grids | 15 | 1.06 | 2013 |
Analysis of Safety-Critical Computer Failures in Medical Devices | 10 | 1.64 | 2013 |
SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework | 22 | 1.08 | 2013 |
Towards resiliency in embedded medical monitoring devices. | 2 | 0.49 | 2012 |
Characterization of the error resiliency of power grid substation devices | 4 | 0.40 | 2012 |
Improving Log-based Field Failure Data Analysis of multi-node computing systems | 28 | 1.27 | 2011 |
HTAF: hybrid testing automation framework to leverage local and global computing resources | 1 | 0.36 | 2011 |
CloudVal: A framework for validation of virtualization environment in cloud infrastructure | 30 | 1.02 | 2011 |
Fault injection-based assessment of partial fault tolerance in stream processing applications | 15 | 0.60 | 2011 |
A Soldier Health Monitoring System for Military Applications | 8 | 0.84 | 2010 |
Fourth workshop on dependable and secure nanocomputing | 0 | 0.34 | 2010 |
Analysis of Credential Stealing Attacks in an Open Networked Environment | 8 | 0.63 | 2010 |
Quantitative Analysis of Long-Latency Failures in System Software | 8 | 0.64 | 2009 |
Discovering Application-Level Insider Attacks Using Symbolic Execution | 5 | 0.49 | 2009 |