Year |
Citation |
Score |
2020 |
Abdallah M, Naghizadeh P, Hota AR, Cason T, Bagchi S, Sundaram S. Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs Ieee Transactions On Control of Network Systems. 1-1. DOI: 10.1109/Tcns.2020.2988007 |
0.31 |
|
2020 |
Jiang X, Zhang H, Yi EAB, Raghunathan N, Mousoulis C, Chaterji S, Peroulis D, Shakouri A, Bagchi S. Hybrid Low-Power Wide-Area Mesh Network for IoT Applications Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.3009228 |
0.371 |
|
2020 |
Bagchi S, Abdelzaher TF, Govindan R, Shenoy PJ, Atrey A, Ghosh P, Xu R. New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.3007690 |
0.402 |
|
2019 |
Mitra A, Richards JA, Bagchi S, Sundaram S. Resilient distributed state estimation with mobile agents: overcoming Byzantine adversaries, communication losses, and intermittent measurements Autonomous Robots. 43: 743-768. DOI: 10.1007/S10514-018-9813-7 |
0.383 |
|
2018 |
Sen S, Koo J, Bagchi S. TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices Ieee Internet Computing. 22: 74-81. DOI: 10.1109/Mic.2018.011581520 |
0.408 |
|
2018 |
Gutierrez CN, Spafford EH, Bagchi S, Yurek T. Reactive redundancy for data destruction protection (R2D2) Computers & Security. 74: 184-201. DOI: 10.1016/J.Cose.2017.12.012 |
0.312 |
|
2017 |
Meyer F, Bagchi S, Chaterji S, Gerlach W, Grama A, Harrison T, Paczian T, Trimble WL, Wilke A. MG-RAST version 4-lessons learned from a decade of low-budget ultra-high-throughput metagenome analysis. Briefings in Bioinformatics. PMID 29028869 DOI: 10.1093/Bib/Bbx105 |
0.325 |
|
2017 |
Chaterji S, Koo J, Li N, Meyer F, Grama A, Bagchi S. Federation in genomics pipelines: techniques and challenges. Briefings in Bioinformatics. PMID 28968781 DOI: 10.1093/Bib/Bbx102 |
0.341 |
|
2016 |
Shin D, Bagchi S, Wang C. Toward Optimal Distributed Monitoring of Multi-Channel Wireless Networks Ieee Transactions On Mobile Computing. 15: 1826-1838. DOI: 10.1109/Tmc.2015.2478458 |
0.571 |
|
2015 |
Laguna I, Ahn DH, De Supinski BR, Bagchi S, Gamblin T. Diagnosis of Performance Faults in LargeScale MPI Applications via Probabilistic Progress-Dependence Inference Ieee Transactions On Parallel and Distributed Systems. 26: 1280-1289. DOI: 10.1109/Tpds.2014.2314100 |
0.325 |
|
2013 |
Shin DH, Moses D, Venkatachalam M, Bagchi S. Distributed mobility management for efficient video delivery over all-IP mobile networks: Competing approaches Ieee Network. 27: 28-33. DOI: 10.1109/Mnet.2013.6485093 |
0.558 |
|
2013 |
Khalil I, Bagchi S, Abuali N, Hayajneh M. DISA: Detection and isolation of sneaky attackers in locally monitored multi-hop wireless networks Security and Communication Networks. 6: 1524-1538. DOI: 10.1002/Sec.152 |
0.457 |
|
2012 |
Panta RK, Bagchi S. Mitigating the effects of software component shifts for incremental reprogramming of wireless sensor networks Ieee Transactions On Parallel and Distributed Systems. 23: 1882-1894. DOI: 10.1109/Tpds.2012.55 |
0.716 |
|
2011 |
Panta RK, Bagchi S, Midkiff SP. Efficient incremental code update for sensor networks Acm Transactions On Sensor Networks. 7. DOI: 10.1145/1921621.1921624 |
0.722 |
|
2011 |
Khalil I, Bagchi S. Stealthy attacks in wireless ad hoc networks: Detection and countermeasure Ieee Transactions On Mobile Computing. 10: 1096-1112. DOI: 10.1109/Tmc.2010.249 |
0.466 |
|
2011 |
Hacker TJ, Eigenmann R, Bagchi S, Irfanoglu A, Pujol S, Catlin A, Rathje E. The NEEShub cyberinfrastructure for earthquake engineering Computing in Science and Engineering. 13: 67-77. DOI: 10.1109/Mcse.2011.70 |
0.335 |
|
2011 |
Hariharan S, Shroff NB, Bagchi S. Secure neighbor discovery through overhearing in static multihop wireless networks Computer Networks. 55: 1229-1241. DOI: 10.1016/J.Comnet.2010.10.021 |
0.462 |
|
2009 |
Wu Y, Apte V, Bagchi S, Garg S, Singh N. Intrusion detection in voice over IP environments International Journal of Information Security. 8: 153-172. DOI: 10.1007/S10207-008-0071-0 |
0.518 |
|
2008 |
Krasniewski MD, Panta RK, Bagchi S, Yang CL, Chappell WJ. Energy-efficient on-demand reprogramming of large-scale sensor networks Acm Transactions On Sensor Networks. 4. DOI: 10.1145/1325651.1325653 |
0.698 |
|
2008 |
Sellke SH, Shroff NB, Bagchi S. Modeling and automated containment of worms Ieee Transactions On Dependable and Secure Computing. 5: 71-86. DOI: 10.1109/Tdsc.2007.70230 |
0.35 |
|
2007 |
Herbert D, Sundaram V, Lu Y, Bagchi S, Li Z. Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking Acm Transactions On Autonomous and Adaptive Systems. 2: 8. DOI: 10.1145/1278460.1278462 |
0.484 |
|
2007 |
Khanna G, Cheng MY, Varadharajan P, Bagchi S, Correia MP, Verissimo PJ. Automated Rule-Based Diagnosis Through a Distributed Monitor System Ieee Transactions On Dependable and Secure Computing. 4: 266-279. DOI: 10.1109/Tdsc.2007.70211 |
0.609 |
|
2007 |
Bagchi S. VMDFS: The design architecture, model and paging latency Proceedings - 2007 International Conference On Multimedia and Ubiquitous Engineering, Mue 2007. 1004-1009. DOI: 10.1109/MUE.2007.217 |
0.317 |
|
2007 |
Khalil I, Bagchi S, Shroff NB. LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks Computer Networks. 51: 3750-3772. DOI: 10.1016/J.Comnet.2007.04.001 |
0.483 |
|
2007 |
Wu YS, Foo B, Mao YC, Bagchi S, Spafford EH. Automated adaptive intrusion containment in systems of interacting services Computer Networks. 51: 1334-1360. DOI: 10.1016/J.Comnet.2006.09.006 |
0.503 |
|
2006 |
Bagchi S. Dependable deployments of ad hoc and mesh networks Diwans 2006 - Proceedings of the 2006 Workshop On Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (Part of Mobicom 2006). 2006: 45. DOI: 10.1145/1160972.1160981 |
0.34 |
|
2006 |
Khanna G, Varadharajan P, Bagchi S. Automated online monitoring of distributed applications through external monitors Ieee Transactions On Dependable and Secure Computing. 3: 115-129. DOI: 10.1109/Tdsc.2006.17 |
0.626 |
|
2006 |
Yang CL, Bagchi S, Chappell WJ. Topology insensitive location determination using independent estimates through semi-directional antennas Ieee Transactions On Antennas and Propagation. 54: 3458-3472. DOI: 10.1109/Tap.2006.884294 |
0.408 |
|
2005 |
Bagchi S, Das P. A round-2 randomized leader election algorithm and latency for MDVM system Proceedings - International Conference On Next Generation Web Services Practices, Nwesp 2005. 2005: 103-108. DOI: 10.1109/NWESP.2005.9 |
0.307 |
|
2000 |
Bagchi S, Srinivasan B, Whisnant K, Kalbarczyk Z, Iyer RK. Hierarchical error detection in a software implemented fault tolerance (SIFT) environment Ieee Transactions On Knowledge and Data Engineering. 12: 203-224. DOI: 10.1109/69.842263 |
0.565 |
|
1999 |
Kalbarczyk ZT, Iyer RK, Bagchi S, Whisnant K. Chameleon: A software infrastructure for adaptive fault tolerance Ieee Transactions On Parallel and Distributed Systems. 10: 560-579. DOI: 10.1109/71.774907 |
0.592 |
|
Show low-probability matches. |