The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Saurabh Bagchi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi
    Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:234-244 [Conf]
  2. Saurabh Bagchi
    Fast Abstracts. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:595- [Conf]
  3. Saurabh Bagchi, Douglas M. Blough, Paolo Santi, Nitin H. Vaidya
    DIWANS: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:900- [Conf]
  4. Saurabh Bagchi, Y. Liu, Keith Whisnant, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Y. Levendel, Lawrence G. Votta
    A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller. [Citation Graph (0, 0)][DBLP]
    DSN, 2001, pp:225-234 [Conf]
  5. Sumeer Bhola, Robert E. Strom, Saurabh Bagchi, Yuanyuan Zhao, Joshua S. Auerbach
    Exactly-once Delivery in a Content-based Publish-Subscribe System. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:7-16 [Conf]
  6. Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford
    ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:508-517 [Conf]
  7. Issa Khalil, Saurabh Bagchi, Ness B. Shroff
    LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:612-621 [Conf]
  8. Gunjan Khanna, Saurabh Bagchi, Yu-Sung Wu
    Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:795-804 [Conf]
  9. Mark D. Krasniewski, Padma Varadharajan, Bryan Rabeler, Saurabh Bagchi, Y. Charlie Hu
    TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:672-681 [Conf]
  10. Sarah Sellke, Ness B. Shroff, Saurabh Bagchi
    Modeling and Automated Containment of Worms. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:528-537 [Conf]
  11. Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Singh, Timothy K. Tsai
    SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:433-442 [Conf]
  12. Ravishankar K. Iyer, Zbigniew Kalbarczyk, Keith Whisnant, Saurabh Bagchi
    A Flexible Software Architecture for High Availability Computing. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:42-49 [Conf]
  13. Yuldi Tirta, Zhiyuan Li, Yung-Hsiang Lu, Saurabh Bagchi
    Efficient Collection of Sensor Data in Remote Fields Using Mobile Collectors. [Citation Graph (0, 0)][DBLP]
    ICCCN, 2004, pp:515-520 [Conf]
  14. Nipoon Malhotra, Mark D. Krasniewski, Chin-Lung Yang, Saurabh Bagchi, William J. Chappell
    Location Estimation in Ad Hoc Networks with Directional Antennas. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:633-642 [Conf]
  15. David T. Stott, Neil A. Speirs, Zbigniew Kalbarczyk, Saurabh Bagchi, Jun Xu, Ravishankar K. Iyer
    Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2001, pp:31- [Conf]
  16. Saurabh Bagchi, Henrique Madeira
    Open Source Software - A Recipe for Vulnerable Software, or The Only Way to Keep the Bugs and the Bad Guys Out? [Citation Graph (0, 0)][DBLP]
    ISSRE, 2003, pp:347-352 [Conf]
  17. Serdar Cabuk, Nipoon Malhotra, Longbi Lin, Saurabh Bagchi, Ness B. Shroff
    Analysis and Evaluation of Topological and Application Characteristics of Unreliable Mobile Wireless Ad-hoc Network. [Citation Graph (0, 0)][DBLP]
    PRDC, 2004, pp:248-257 [Conf]
  18. Gunjan Khanna, Saurabh Bagchi, John Rogers
    Failure Handling in a Reliable Multicast Protocol for Improving Buffer Utilization and Accommodating Heterogeneous Receivers. [Citation Graph (0, 0)][DBLP]
    PRDC, 2004, pp:15-24 [Conf]
  19. Saurabh Bagchi, Keith Whisnant, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    The Chameleon Infrastructure for Adaptive, Software Implemented Fault Tolerance. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1998, pp:261-267 [Conf]
  20. Ravishankar K. Iyer, Zbigniew Kalbarczyk, Saurabh Bagchi
    Chameleon: Adaptive Fault Tolerance Using Reliable, Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1997, pp:61-62 [Conf]
  21. Gunjan Khanna, Padma Varadharajan, Saurabh Bagchi
    Self Checking Network Protocols: A Monitor Based Approach. [Citation Graph (0, 0)][DBLP]
    SRDS, 2004, pp:18-30 [Conf]
  22. Nipoon Malhotra, Shrish Ranjan, Saurabh Bagchi
    LRRM: A Randomized Reliable Multicast Protocol for Optimizing Recovery Latency and Buffer Utilization. [Citation Graph (0, 0)][DBLP]
    SRDS, 2005, pp:215-225 [Conf]
  23. Douglas Herbert, Yung-Hsiang Lu, Saurabh Bagchi, Zhiyuan Li
    Detection and Repair of Software Errors in Hierarchical Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SUTC (1), 2006, pp:403-410 [Conf]
  24. Gunjan Khanna, Padma Varadharajan, Saurabh Bagchi
    Automated Online Monitoring of Distributed Applications through External Monitors. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:2, pp:115-129 [Journal]
  25. Saurabh Bagchi, Balaji Srinivasan, Keith Whisnant, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Hierarchical Error Detection in a Software Implemented Fault Tolerance (SIFT) Environment. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:2, pp:203-224 [Journal]
  26. Zbigniew Kalbarczyk, Ravishankar K. Iyer, Saurabh Bagchi, Keith Whisnant
    Chameleon: A Software Infrastructure for Adaptive Fault Tolerance. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1999, v:10, n:6, pp:560-579 [Journal]
  27. Issa Khalil, Saurabh Bagchi, Ness B. Shroff
    SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:565-574 [Conf]
  28. Xiaojuan Ren, Rudolf Eigenmann, Saurabh Bagchi
    Failure-aware checkpointing in fine-grained cycle sharing systems. [Citation Graph (0, 0)][DBLP]
    HPDC, 2007, pp:33-42 [Conf]
  29. Rajesh Krishna Panta, Issa Khalil, Saurabh Bagchi
    Stream: Low Overhead Wireless Reprogramming for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:928-936 [Conf]
  30. Issa Khalil, Saurabh Bagchi, Ness B. Shroff
    Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:3, pp:360-391 [Journal]
  31. Issa Khalil, Saurabh Bagchi, Ness B. Shroff
    LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3750-3772 [Journal]
  32. Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford
    Automated adaptive intrusion containment in systems of interacting services. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:5, pp:1334-1360 [Journal]
  33. Xiaojuan Ren, Seyong Lee, Rudolf Eigenmann, Saurabh Bagchi
    Prediction of Resource Availability in Fine-Grained Cycle Sharing Systems Empirical Evaluation. [Citation Graph (0, 0)][DBLP]
    J. Grid Comput., 2007, v:5, n:2, pp:173-195 [Journal]
  34. Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel P. Correia, Paulo Veríssimo
    Automated Rule-Based Diagnosis through a Distributed Monitor System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:4, pp:266-279 [Journal]
  35. Douglas Herbert, Vinaitheerthan Sundaram, Yung-Hsiang Lu, Saurabh Bagchi, Zhiyuan Li
    Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking. [Citation Graph (0, 0)][DBLP]
    TAAS, 2007, v:2, n:3, pp:- [Journal]

  36. 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009. [Citation Graph (, )][DBLP]


  37. Spam detection in voice-over-IP calls through semi-supervised clustering. [Citation Graph (, )][DBLP]


  38. Resource Availability Prediction in Fine-Grained Cycle Sharing Systems. [Citation Graph (, )][DBLP]


  39. Pesticide: Using SMT Processors to Improve Performance of Pointer Bug Detection. [Citation Graph (, )][DBLP]


  40. Hermes: Fast and Energy Efficient Incremental Code Updates for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  41. TCP/IP Timing Channels: Theory to Implementation. [Citation Graph (, )][DBLP]


  42. How to Keep Your Head above Water While Detecting Errors. [Citation Graph (, )][DBLP]


  43. Optimal monitoring in multi-channel multi-radio wireless mesh networks. [Citation Graph (, )][DBLP]


  44. Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems. [Citation Graph (, )][DBLP]


  45. Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling. [Citation Graph (, )][DBLP]


  46. FALCON: a system for reliable checkpoint recovery in shared grid environments. [Citation Graph (, )][DBLP]


  47. A tale of two synchronizing clocks. [Citation Graph (, )][DBLP]


  48. Stateful Detection in High Throughput Distributed Systems. [Citation Graph (, )][DBLP]


  49. Distributed Diagnosis of Failures in a Three Tier E-Commerce System. [Citation Graph (, )][DBLP]


  50. SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  51. Single versus multi-hop wireless reprogramming in sensor networks. [Citation Graph (, )][DBLP]


  52. Optimizing AES for embedded devices and wireless sensor networks. [Citation Graph (, )][DBLP]


  53. Data-Centric Routing in Sensor Networks: Single-hop Broadcast or Multi-hop Unicast? [Citation Graph (, )][DBLP]


  54. Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping. [Citation Graph (, )][DBLP]


  55. MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks. [Citation Graph (, )][DBLP]


  56. UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.421secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002