Name
Papers
Collaborators
RAVISHANKAR K. IYER
254
453
Citations 
PageRank 
Referers 
3489
504.32
5948
Referees 
References 
3824
2303
Search Limit
1001000
Title
Citations
PageRank
Year
Data-Driven Application-Oriented Reliability Model of a High-Performance Computing System10.392022
Delay sensitivity-driven congestion mitigation for HPC systems00.342021
Improved GPU Implementations of the Pair-HMM Forward Algorithm for DNA Sequence Alignment00.342021
Crimson: An Open-Source Software Framework For Cardiovascular Integrated Modelling And Simulation00.342021
BayesPerf: minimizing performance monitoring errors using Bayesian statistics00.342021
A Dynamic Human-in-the-loop Recommender System for Evidence-based Clinical Staging of COVID-19.00.342020
ML-Driven Malware that Targets AV Safety10.362020
Electrophysiological Correlates Of Brain Health Help Diagnose Epilepsy And Lateralize Seizure Focus00.342020
The Mystery of the Failing Jobs: Insights from Operational Data from Two University-Wide Computing Systems00.342020
Inductive-bias-driven Reinforcement Learning For Efficient Schedules in Heterogeneous Clusters.00.342020
Challenges and Opportunities in the Detection of Safety-Critical Cyberphysical Attacks00.342020
Recommendations for performance optimizations when using GATK3.8 and GATK4.00.342019
RAINCOAT: RAndomization of Network Communication in Power Grid Cyber INfrastructure to Mislead Attackers10.352019
A Computationally Efficient Model for Predicting Successful Memory Encoding Using Machine-Learning-based EEG Channel Selection00.342019
A Study of Network Congestion in Two Supercomputing High-Speed Interconnects10.342019
Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field Data90.912018
Indirect cyber attacks by perturbation of environment control: a data driven attack model: poster.00.342018
Impact of Malicious SCADA Commands on Power Grids’ Dynamic Responses00.342018
Self-Healing Attack-Resilient PMU Network for Power System Operation.70.632018
Characterizing Supercomputer Traffic Networks Through Link-Level Analysis10.362018
Attack Induced Common-Mode Failures on PLC-Based Safety System in a Nuclear Power Plant: Practical Experience Report.00.342017
Prediction Of Adenocarcinoma Development Using Game Theory00.342017
Failure Diagnosis for Distributed Systems Using Targeted Fault Injection.80.552017
Svauth - A Single-Sign-On Integration Solution With Runtime Verification00.342017
Optimal False Data Injection Attack against Automatic Generation Control in Power Grids100.592016
Efficient and Scalable Workflows for Genomic Analyses.10.432016
A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures.30.412016
Game Theory with Learning for Cyber Security Monitoring70.522016
Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges311.302015
Resilience of Medical Devices and Systems00.342015
Systems-theoretic Safety Assessment of Robotic Telesurgical Systems.100.662015
Preemptive intrusion detection20.422014
Characterization of operational failures from a business data processing SaaS platform90.532014
AHEMS: Asynchronous Hardware-Enforced Memory Safety00.342014
Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants.80.642014
Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol361.972013
Semantic security analysis of SCADA networks to detect malicious control commands in power grids151.062013
Analysis of Safety-Critical Computer Failures in Medical Devices101.642013
SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework221.082013
Towards resiliency in embedded medical monitoring devices.20.492012
Characterization of the error resiliency of power grid substation devices40.402012
Improving Log-based Field Failure Data Analysis of multi-node computing systems281.272011
HTAF: hybrid testing automation framework to leverage local and global computing resources10.362011
CloudVal: A framework for validation of virtualization environment in cloud infrastructure301.022011
Fault injection-based assessment of partial fault tolerance in stream processing applications150.602011
A Soldier Health Monitoring System for Military Applications80.842010
Fourth workshop on dependable and secure nanocomputing00.342010
Analysis of Credential Stealing Attacks in an Open Networked Environment80.632010
Quantitative Analysis of Long-Latency Failures in System Software80.642009
Discovering Application-Level Insider Attacks Using Symbolic Execution50.492009
  • 1
  • 2