Saurabh Bagchi
Saurabh Bagchi
Electrical and Computer Engineering, Computer Science; Director Army A2I2 & CRISP; Purdue University
Verified email at - Homepage
Cited by
Cited by
Addressing failures in exascale computing
M Snir, RW Wisniewski, JA Abraham, SV Adve, S Bagchi, P Balaji, J Belak, ...
The International Journal of High Performance Computing Applications 28 (2 …, 2014
Watson: beyond jeopardy!
D Ferrucci, A Levas, S Bagchi, D Gondek, ET Mueller
Artificial Intelligence 199, 93-105, 2013
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks
I Khalil, S Bagchi, NB Shroff
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
Chameleon: A software infrastructure for adaptive fault tolerance
ZT Kalbarczyk, RK Iyer, S Bagchi, K Whisnant
IEEE Transactions on Parallel and Distributed Systems 10 (6), 560-579, 1999
ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment
B Foo, YS Wu, YC Mao, S Bagchi, E Spafford
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
TCP/IP timing channels: Theory to implementation
SH Sellke, CC Wang, S Bagchi, N Shroff
IEEE INFOCOM 2009, 2204-2212, 2009
Exactly-once delivery in a content-based publish-subscribe system
S Bhola, R Strom, S Bagchi, Y Zhao, J Auerbach
Proceedings International Conference on Dependable Systems and Networks, 7-16, 2002
MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks
I Khalil, S Bagchi, NB Shroff
Ad Hoc Networks 6 (3), 344-362, 2008
The MG-RAST metagenomics database and portal in 2015
A Wilke, J Bischof, W Gerlach, E Glass, T Harrison, KP Keegan, T Paczian, ...
Nucleic acids research 44 (D1), D590-D594, 2016
Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS
YS Wu, B Foo, Y Mei, S Bagchi
19th Annual Computer Security Applications Conference (ACSAC), 234-244, 2003
Modeling and automated containment of worms
SH Sellke, NB Shroff, S Bagchi
IEEE Transactions on Dependable and Secure Computing 5 (2), 71-86, 2008
Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments
YS Wu, S Bagchi, S Garg, N Singh
International conference on dependable systems and networks, 2004, 433-442, 2004
Stream: Low overhead wireless reprogramming for sensor networks
RK Panta, I Khalil, S Bagchi
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
Characterizing failures in mobile oses: A case study with android and symbian
AK Maji, K Hao, S Sultana, S Bagchi
2010 IEEE 21st international symposium on software reliability engineering …, 2010
An empirical study of the robustness of inter-component communication in Android
AK Maji, FA Arshad, S Bagchi, JS Rellermeyer
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
McrEngine: A scalable checkpointing system using data-aware aggregation and compression
TZ Islam, K Mohror, S Bagchi, A Moody, BR De Supinski, R Eigenmann
SC'12: Proceedings of the International Conference on High Performance …, 2012
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation
A Clements, E Gustafson, T Scharnowski, P Grosen, D Fritz, C Kruegel, ...
29th USENIX Security Symposium (USENIX Sec), 1--19, 2020
Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks
I Khalil, S Bagchi, NB Shroff
Computer networks 51 (13), 3750-3772, 2007
MG-RAST version 4—lessons learned from a decade of low-budget ultra-high-throughput metagenome analysis
F Meyer, S Bagchi, S Chaterji, W Gerlach, A Grama, T Harrison, T Paczian, ...
Briefings in bioinformatics 20 (4), 1151-1159, 2019
Protocol for secure and energy-efficient reprogramming of wireless multi-hop sensor networks
S Bagchi, NB Shroff, IMI Khalil, RK Panta, MD Krasniewski, JV Krogmeier
US Patent 8,107,397, 2012
The system can't perform the operation now. Try again later.
Articles 1–20