Anthony Skjellum

ORCID: 0000-0001-5252-6600
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Parallel Computing and Optimization Techniques
  • Distributed and Parallel Computing Systems
  • Advanced Data Storage Technologies
  • Distributed systems and fault tolerance
  • Embedded Systems Design Techniques
  • Interconnection Networks and Systems
  • Blockchain Technology Applications and Security
  • Advanced Malware Detection Techniques
  • Real-Time Systems Scheduling
  • Cloud Computing and Resource Management
  • Scientific Computing and Data Management
  • Caching and Content Delivery
  • Software System Performance and Reliability
  • Spam and Phishing Detection
  • Numerical Methods and Algorithms
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Cryptography and Data Security
  • Advanced Memory and Neural Computing
  • Cloud Data Security Solutions
  • Coding theory and cryptography
  • User Authentication and Security Systems
  • Advanced Control Systems Optimization
  • Additive Manufacturing and 3D Printing Technologies

University of Tennessee at Chattanooga
2018-2024

Tennessee Technological University
2023-2024

Sandia National Laboratories
2015-2022

Queen's University
2022

Commissariat à l'Énergie Atomique et aux Énergies Alternatives
2022

Hôpital Saint-Julien
2022

University of Tennessee at Knoxville
2017-2019

Auburn University
2014-2018

Boston University
2018

University of Alabama at Birmingham
2004-2014

10.1016/0898-1221(95)90199-x article EN Computers & Mathematics with Applications 1995-11-01

Cryptocurrencies have emerged as important financial software systems. They rely on a secure distributed ledger data structure; mining is an integral part of such Mining adds records past transactions to the known Blockchain, allowing users reach secure, robust consensus for each transaction. also introduces wealth in form new units currency. lack central authority mediate because they were designed peer-to-peer miners validate transactions. require strong, algorithms. In this paper we...

10.1109/pst.2016.7906988 article EN 2016-12-01

The Internet of Things (IoT) is a massive group devices containing sensors or actuators connected together over wired wireless networks. With an estimate 25 billion by 2020, IoT has been rapidly growing the past decade. During growth, security identified as one weakest areas in IoT. When implementing within network, there are several challenges including heterogeneity system well quantity that need to be addressed. To approach securing devices, we propose using machine learning gateway help...

10.1109/pst.2016.7906930 article EN 2016-12-01

Driven by the rapid escalation of its utilization, as well ramping commercialization, Internet Things (IoT) devices increasingly face security threats. Apart from denial service, privacy, and safety concerns, compromised can be used enablers for committing a variety crime e-crime. Despite ongoing research study, there remains significant gap in thorough analysis challenges, feasible solutions, open secure problems IoT. To bridge this gap, we provide comprehensive overview state art IoT with...

10.3390/fi16020040 article EN cc-by Future Internet 2024-01-24

Recently, there has been a lot of interest in using Java for parallel programming. Efforts have hindered by lack standard programming APIs. To alleviate this problem, various groups started projects to develop message passing systems modelled on the successful Message Passing Interface (MPI). Official MPI bindings are currently defined only C, Fortran, and C++, so early MPI-like environments divergent. This paper relates an effort undertaken working group Grande Forum, seeking consensus API,...

10.1002/1096-9128(200009)12:11<1019::aid-cpe518>3.0.co;2-g article EN Concurrency Practice and Experience 2000-01-01

10.1016/j.ijcip.2015.12.004 article EN International Journal of Critical Infrastructure Protection 2016-06-25

Understanding the state-of-the-practice in MPI usage is paramount for many aspects of supercomputing, including optimizing communication HPC applications and informing standardization bodies systems procurements regarding most important features. Unfortunately, no previous study has characterized use on at a significant scale; surveys focus either small data samples or jobs specific centers. This paper presents first comprehensive applications. We survey more than one hundred distinct...

10.1145/3295500.3356176 article EN 2019-11-07

It is estimated that the number of Internet-of-Things (IoT) devices will reach 75 billion in next five years. Most those currently and soon-to-be deployed lack sufficient security to protect themselves their networks from attacks by malicious IoT masquerading as authorized order circumvent digital authentication approaches. This work presents a physical (PHY) layer approach capable addressing this critical need through use feature-reduced, radio frequency-distinct native attributes (RF-DNA)...

10.1109/jiot.2020.3045305 article EN IEEE Internet of Things Journal 2020-12-17

Imposter devices pose serious threats. The majority of low-cost edge can easily be counterfeited or cloned; the supply chain is insufficiently secure. Reliability deployed called into question simply because they might counterfeit cloned. It a must to identify devices' sourcing uniquely and verify their validity periodically at runtime. We integrate blockchain technology authenticate resource-constrained, devices. use SRAM-based physically unclonable functions (PUFs)to generate unique...

10.1109/cybermatics_2018.2018.00193 article EN 2018-07-01

Current blockchains often are designed with one use case in mind, such as currency transfer Bitcoin or record storage Namecoin. While application-specific powerful tools for fulfilling their niche cases, there like Ethereum that have a set of cases comprising superset the many blockchains. These generalized extending decentralization to new without designing entirely This paper considers tradeoffs design and implementation blockchain systems intend deliver general functionality examines...

10.1109/cybermatics_2018.2018.00265 article EN 2018-07-01

10.1016/j.accinf.2020.100466 article EN publisher-specific-oa International Journal of Accounting Information Systems 2020-07-16

For the last three decades a core use of FPGAs has been for processing communication: FPGA-based SmartNICs are in widespread from datacenter to IoT. Augmenting switches with FPGAs, however, less studied, but numerous advantages built around being moved edge network center. Communication have previously augmented process collectives, e.g., IBM BlueGene and Mellanox SHArP, support limited small set predefined scalar operations datatypes. Here we present ACiS, framework taxonomy Advanced...

10.48550/arxiv.2501.18749 preprint EN arXiv (Cornell University) 2025-01-30

Because of the enhanced capability adversaries, edge devices Internet Things (IoT) infrastructure are now increasingly vulnerable to counterfeiting and piracy. Ensuring authenticity such is great concern since an adversary can create a backdoor either bypass security, and/or leak secret information over unsecured communication channel. The reliability could also be called into question because they might counterfeit, defective inferior quality. It prime importance design develop solutions...

10.1109/vlsid.2018.42 article EN 2018-01-01

The rise of cloud computing has changed the way services and resources are used. However, existing digital forensics science cannot cope with black-box nature clouds nor multi-tenant models. Because fundamental characteristics clouds, many assumptions invalidated in clouds. In process involving role service providers (CSP) is utterly important, a which needs to be considered forensics. this paper, we define considering CSP propose Open Cloud Forensics (OCF) model. Based on OCF model,...

10.1109/cloud.2015.65 article EN 2015-06-01

MPI has proven effective for parallel applications in situations with neither QoS nor fault handling. Emerging environments motivate fault-tolerant middleware. Environments include space-based, wide-area/web/meta computing and scalable clusters. MPI/FT, the system described paper, trades off sufficient coverage against acceptable performance, based on mission requirements constraints. codes are evolved to use MPI/FT features. Non-portable code event handlers recovery management is isolated....

10.1109/ccgrid.2001.923171 article EN 2002-11-13

Abstract Advances in computer technologies have enabled scientists to explore research issues their respective domains at scales greater and finer than ever before. The availability of efficient data collection analysis tools presents researchers with vast opportunities process heterogeneous within a distributed environment. To support the by massive computation, suitable scientific workflow system is needed help users manage programs, design reusable procedures experimental tasks. In this...

10.1002/cpe.988 article EN Concurrency and Computation Practice and Experience 2005-12-13

Phishers continue to alter the source code of web pages used in their attacks mimic changes legitimate websites spoofed organizations and avoid detection by phishing countermeasures. Manipulations can be as subtle or apparent adding removing significant content. To appropriately respond these campaigns, a cadre file matching algorithms is implemented detect based on content, employing custom data set consisting 17,992 targeting 159 different brands. The results experiments using variety...

10.1109/ecrime.2011.6151977 article EN 2011-11-01

Plants respond to diverse environmental cues including microbial perturbations by coordinated regulation of thousands genes. These intricate transcriptional regulatory interactions depend on the recognition specific promoter sequences transcription factors. The combinatorial and cooperative action multiple factors defines a network that enables plant cells distinct biological signals. identification immune-related modules in large-scale networks can reveal mechanisms which exposure pathogen...

10.1186/1471-2164-15-421 article EN cc-by BMC Genomics 2014-06-03

The Internet of Things (IoT) is becoming a key infrastructure for the development smart ecosystems. However, increased deployment IoT devices with poor security has already rendered them increasingly vulnerable to cyber attacks. In some cases, they can be used as tool committing serious crimes. Although researchers have explored such issues in domain and provided solutions them, there remains need thorough analysis challenges, solutions, open problems this domain. paper, we consider research...

10.1109/icdcsw.2017.78 article EN 2017-06-01
Coming Soon ...