Model checking firewall policy configurations A Jeffrey, T Samak 2009 IEEE International Symposium on Policies for Distributed Systems and …, 2009 | 93 | 2009 |
Using online traffic statistical matching for optimizing packet filtering performance A El-Atawy, T Samak, E Al-Shaer, H Li IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 80 | 2007 |
Observational data patterns for time series data quality assessment G Pastorello, D Agarwal, D Papale, T Samak, C Trotta, A Ribeca, ... 2014 IEEE 10th International Conference on e-Science 1, 271-278, 2014 | 58 | 2014 |
An automated framework for validating firewall policy enforcement A El-Atawy, T Samak, Z Wali, E Al-Shaer, F Lin, C Pham, S Li Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007 | 56 | 2007 |
Automated pseudo-live testing of firewall configuration enforcement E Al-Shaer, A El-Atawy, T Samak IEEE Journal on Selected Areas in Communications 27 (3), 302-314, 2009 | 53 | 2009 |
Online workflow management and performance analysis with stampede D Gunter, E Deelman, T Samak, CH Brooks, M Goode, G Juve, G Mehta, ... 2011 7th International Conference on Network and Service Management, 1-10, 2011 | 45 | 2011 |
Online fault and anomaly detection for large-scale scientific workflows T Samak, D Gunter, M Goode, E Deelman, G Juve, G Mehta, F Silva, ... 2011 IEEE International Conference on High Performance Computing and …, 2011 | 40 | 2011 |
Firecracker: A framework for inferring firewall policies using smart probing T Samak, A El-Atawy, E Al-Shaer 2007 IEEE International Conference on Network Protocols, 294-303, 2007 | 38 | 2007 |
Failure analysis of distributed scientific workflows executing in the cloud T Samak, D Gunter, M Goode, E Deelman, G Juve, F Silva, K Vahi 2012 8th international conference on network and service management (cnsm …, 2012 | 34 | 2012 |
Workflow management for real-time analysis of lightsource experiments J Deslippe, A Essiari, SJ Patton, T Samak, CE Tull, A Hexemer, D Kumar, ... 2014 9th Workshop on Workflows in Support of Large-Scale Science, 31-40, 2014 | 31 | 2014 |
Scalable analysis of network measurements with Hadoop and Pig T Samak, D Gunter, V Hendrix 2012 IEEE Network Operations and Management Symposium, 1254-1259, 2012 | 26 | 2012 |
Failure prediction and localization in large scientific workflows T Samak, D Gunter, M Goode, E Deelman, G Mehta, F Silva, K Vahi Proceedings of the 6th workshop on Workflows in support of large-scale …, 2011 | 26 | 2011 |
A general approach to real-time workflow monitoring K Vahi, I Harvey, T Samak, D Gunter, K Evans, D Rogers, I Taylor, ... 2012 SC Companion: High Performance Computing, Networking Storage and …, 2012 | 25 | 2012 |
A case study into using common real-time workflow monitoring infrastructure for scientific workflows K Vahi, I Harvey, T Samak, D Gunter, K Evans, D Rogers, I Taylor, ... Journal of grid computing 11, 381-406, 2013 | 23 | 2013 |
Firewall policy reconnaissance: Techniques and analysis MQ Ali, E Al-Shaer, T Samak IEEE transactions on information forensics and security 9 (2), 296-308, 2014 | 22 | 2014 |
Identifying HPC codes via performance logs and machine learning O DeMasi, T Samak, DH Bailey Proceedings of the first workshop on Changing landscapes in HPC security, 23-30, 2013 | 22 | 2013 |
Prediction of protein solubility in E. coli T Samak, D Gunter, Z Wang 2012 IEEE 8th International Conference on E-Science, 1-8, 2012 | 15 | 2012 |
Firewall policy reconstruction by active probing: An attacker's view T Samak, A El-Atawy, E Al-Shaer, H Li 2006 2nd IEEE Workshop on Secure Network Protocols, 20-25, 2006 | 15 | 2006 |
QoS policy modeling and conflict analysis T Samak, E Al-Shaer, H Li 2008 IEEE Workshop on Policies for Distributed Systems and Networks, 19-26, 2008 | 14 | 2008 |
Energy consumption models and predictions for large-scale systems T Samak, C Morin, D Bailey 2013 IEEE International Symposium on Parallel & Distributed Processing …, 2013 | 11 | 2013 |