20152019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 4 Similar Profiles
Distributed computer systems Engineering & Materials Science
Natural sciences computing Engineering & Materials Science
Data privacy Engineering & Materials Science
Gravity waves Engineering & Materials Science
Supercomputers Engineering & Materials Science
Intrusion detection Engineering & Materials Science
Observatories Engineering & Materials Science
Security of data Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2015 2019

  • 6 Conference contribution
  • 1 Editorial

Human vs bots: Detecting human attacks in a honeypot environment

Udhani, S., Withers, A. & Bashir, M. N., Jun 2019, 7th International Symposium on Digital Forensics and Security, ISDFS 2019. Varol, A., Karabatak, M., Varol, C. & Teke, S. (eds.). Institute of Electrical and Electronics Engineers Inc., 8757534. (7th International Symposium on Digital Forensics and Security, ISDFS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Research Personnel

Scitokens: Demonstrating Capability-Based Access to Remote Scientific Data using HTCondor

Withers, A., Brown, D., Basney, J., Bockelman, B., Patton, J., Tannenbaum, T., Miller, Z., Weitzel, D., Gaynor, J. & Gao, Y. A., Jul 28 2019, Proceedings of the Practice and Experience in Advanced Research Computing: Rise of the Machines (Learning), PEARC 2019. Association for Computing Machinery, 3333258. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed computer systems
Natural sciences computing
Data privacy
Security of data
Interoperability

Traction: An infrastructure for trusted alert sharing and collaborative mitigaTION

Chung, K., Cao, P., Wu, Y., Kalbarczyk, Z. T., Iyer, R. K. & Withers, A., Apr 1 2019, Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019. Association for Computing Machinery, a27. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection

SciTokens: Capability-based secure access to remote scientific data

Withers, A., Brown, D., Bockelman, B., Gaynor, J., Weitzel, D., Basney, J. A., Tannenbaum, T. & Miller, Z., Jul 22 2018, Practice and Experience in Advanced Research Computing 2018: Seamless Creativity, PEARC 2018. Association for Computing Machinery, a24. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gravity waves
Distributed computer systems
Observatories
Interferometers
Natural sciences computing

Attacking supercomputers through targeted alteration of environmental control: A data driven case study

Chung, K., Formicola, V., Kalbarczyk, Z. T., Iyer, R. K., Withers, A. & Slagell, A. J., Feb 21 2017, 2016 IEEE Conference on Communications and Network Security, CNS 2016. Institute of Electrical and Electronics Engineers Inc., p. 406-410 5 p. 7860528. (2016 IEEE Conference on Communications and Network Security, CNS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supercomputers
Cooling systems
Control systems
Water
Cooling water