Publications
Publication | Type | Year |
---|---|---|
Using External Memory to Improve Cyber-Security Stream MonitoringSIAM Symposium on Algorithmic Principles of Computer Systems
|
Conference Presentation – 2022 Conference Presentation | 2022 |
Advanced Data Structures for Monitoring Cyber StreamsUniversity of New Mexico Computer Science seminar
|
Presentation (non-conference) – 2021 Presentation (non-conference) | 2021 |
Timely Reporting of Heavy Hitters using External MemoryACM Transactions on Database Systems |
Journal Article – 2021 Journal Article | 2021 |
Advanced Data Algorithms & Architectures for Security MonitoringSuper Computing 2020
|
Conference Presentation – 2020 Conference Presentation | 2020 |
Timely Reporting of Heavy Hitters using External MemoryAcm Sigmod |
Conference Paper – 2020 Conference Paper | 2020 |
Quantifying Uncertainty in Emulations: LDRD Report |
SAND Report – 2019 SAND Report | 2019 |
Lessons Learned from 10k Experiments to Compare Virtual and Physical Testbeds12th USENIX Workshop on Cyber Security Experimentation and Test |
Conference Paper – 2019 Conference Paper | 2019 |
Tracking Network Events with Write Optimized Data StructuresSuper Computing Network Research Experimentation |
Conference Paper – 2019 Conference Paper | 2019 |
Tracking Network Events with Write Optimized Data StructuresNDIS Super Computing 2019 |
Conference Paper – 2019 Conference Paper | 2019 |
Virtually the Same: Comparing Physical and Virtual TestbedsInternational Conference on Computing, Networking and Communications (ICNC 2019) |
Conference Paper – 2019 Conference Paper | 2019 |
Virtually the Same: Comparing Physical and Virtual TestbedsInternational Conference on Computing, Networking and Communication (ICNC) 2019 |
Conference Paper – 2018 Conference Paper | 2018 |
Tracking Network Events with Write Optimized Data StructuresSuper Computing |
Conference Paper – 2018 Conference Paper | 2018 |
Advanced Data Structures for Improved Cyber Resilience and Awareness in Untrusted Environments: LDRD report |
SAND Report – 2018 SAND Report | 2018 |
Virtually the Same? The Empirical Differences Between Physical and Virtual NetworksResearch Directions for Cyber Experimentation Workshop |
Conference Paper – 2017 Conference Paper | 2017 |
Anti-persistence on persistent storage: history-independent sparse tables and dictionariesACM Principles of Database Systems |
Conference Paper – 2016 Conference Paper | 2016 |
TWIAD the Write-Optimized IP Address DatabaseBadgers 2015 |
Conference Paper – 2016 Conference Paper | 2016 |
Track Network Events with Write Optimized Data StructuresBADGERS 2015 workshop on building analysis datasets and gathering experience for returns on security |
Conference Paper – 2015 Conference Paper | 2015 |
Secure Distributed Membership Tests via Secret Sharing How to Hide Your Hostile Hosts: Harnessing Shamir Secret SharingInternational Conference on Computing, Networking and Communications |
Conference Paper – 2015 Conference Paper | 2015 |
Secure Distributed Set Membership through Secret SharingCis Erb |
Display or Poster (non-conference) – 2015 Display or Poster (non-conference) | 2015 |
Fourier-Assisted Modeling of Hard Disk Drive Access TimesParallel Data Storage Workshop |
Conference Paper – 2013 Conference Paper | 2013 |
Document Title | Type | Year |