- Parallel Computing and Optimization Techniques
- Distributed and Parallel Computing Systems
- Advanced Data Storage Technologies
- Distributed systems and fault tolerance
- Embedded Systems Design Techniques
- Interconnection Networks and Systems
- Blockchain Technology Applications and Security
- Advanced Malware Detection Techniques
- Real-Time Systems Scheduling
- Cloud Computing and Resource Management
- Scientific Computing and Data Management
- Caching and Content Delivery
- Software System Performance and Reliability
- Spam and Phishing Detection
- Numerical Methods and Algorithms
- Physical Unclonable Functions (PUFs) and Hardware Security
- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Cryptography and Data Security
- Advanced Memory and Neural Computing
- Cloud Data Security Solutions
- Coding theory and cryptography
- User Authentication and Security Systems
- Advanced Control Systems Optimization
- Additive Manufacturing and 3D Printing Technologies
University of Tennessee at Chattanooga
2018-2024
Tennessee Technological University
2023-2024
Sandia National Laboratories
2015-2022
Queen's University
2022
Commissariat à l'Énergie Atomique et aux Énergies Alternatives
2022
Hôpital Saint-Julien
2022
University of Tennessee at Knoxville
2017-2019
Auburn University
2014-2018
Boston University
2018
University of Alabama at Birmingham
2004-2014
Cryptocurrencies have emerged as important financial software systems. They rely on a secure distributed ledger data structure; mining is an integral part of such Mining adds records past transactions to the known Blockchain, allowing users reach secure, robust consensus for each transaction. also introduces wealth in form new units currency. lack central authority mediate because they were designed peer-to-peer miners validate transactions. require strong, algorithms. In this paper we...
The Internet of Things (IoT) is a massive group devices containing sensors or actuators connected together over wired wireless networks. With an estimate 25 billion by 2020, IoT has been rapidly growing the past decade. During growth, security identified as one weakest areas in IoT. When implementing within network, there are several challenges including heterogeneity system well quantity that need to be addressed. To approach securing devices, we propose using machine learning gateway help...
Driven by the rapid escalation of its utilization, as well ramping commercialization, Internet Things (IoT) devices increasingly face security threats. Apart from denial service, privacy, and safety concerns, compromised can be used enablers for committing a variety crime e-crime. Despite ongoing research study, there remains significant gap in thorough analysis challenges, feasible solutions, open secure problems IoT. To bridge this gap, we provide comprehensive overview state art IoT with...
Recently, there has been a lot of interest in using Java for parallel programming. Efforts have hindered by lack standard programming APIs. To alleviate this problem, various groups started projects to develop message passing systems modelled on the successful Message Passing Interface (MPI). Official MPI bindings are currently defined only C, Fortran, and C++, so early MPI-like environments divergent. This paper relates an effort undertaken working group Grande Forum, seeking consensus API,...
Understanding the state-of-the-practice in MPI usage is paramount for many aspects of supercomputing, including optimizing communication HPC applications and informing standardization bodies systems procurements regarding most important features. Unfortunately, no previous study has characterized use on at a significant scale; surveys focus either small data samples or jobs specific centers. This paper presents first comprehensive applications. We survey more than one hundred distinct...
It is estimated that the number of Internet-of-Things (IoT) devices will reach 75 billion in next five years. Most those currently and soon-to-be deployed lack sufficient security to protect themselves their networks from attacks by malicious IoT masquerading as authorized order circumvent digital authentication approaches. This work presents a physical (PHY) layer approach capable addressing this critical need through use feature-reduced, radio frequency-distinct native attributes (RF-DNA)...
Imposter devices pose serious threats. The majority of low-cost edge can easily be counterfeited or cloned; the supply chain is insufficiently secure. Reliability deployed called into question simply because they might counterfeit cloned. It a must to identify devices' sourcing uniquely and verify their validity periodically at runtime. We integrate blockchain technology authenticate resource-constrained, devices. use SRAM-based physically unclonable functions (PUFs)to generate unique...
Current blockchains often are designed with one use case in mind, such as currency transfer Bitcoin or record storage Namecoin. While application-specific powerful tools for fulfilling their niche cases, there like Ethereum that have a set of cases comprising superset the many blockchains. These generalized extending decentralization to new without designing entirely This paper considers tradeoffs design and implementation blockchain systems intend deliver general functionality examines...
For the last three decades a core use of FPGAs has been for processing communication: FPGA-based SmartNICs are in widespread from datacenter to IoT. Augmenting switches with FPGAs, however, less studied, but numerous advantages built around being moved edge network center. Communication have previously augmented process collectives, e.g., IBM BlueGene and Mellanox SHArP, support limited small set predefined scalar operations datatypes. Here we present ACiS, framework taxonomy Advanced...
Because of the enhanced capability adversaries, edge devices Internet Things (IoT) infrastructure are now increasingly vulnerable to counterfeiting and piracy. Ensuring authenticity such is great concern since an adversary can create a backdoor either bypass security, and/or leak secret information over unsecured communication channel. The reliability could also be called into question because they might counterfeit, defective inferior quality. It prime importance design develop solutions...
The rise of cloud computing has changed the way services and resources are used. However, existing digital forensics science cannot cope with black-box nature clouds nor multi-tenant models. Because fundamental characteristics clouds, many assumptions invalidated in clouds. In process involving role service providers (CSP) is utterly important, a which needs to be considered forensics. this paper, we define considering CSP propose Open Cloud Forensics (OCF) model. Based on OCF model,...
MPI has proven effective for parallel applications in situations with neither QoS nor fault handling. Emerging environments motivate fault-tolerant middleware. Environments include space-based, wide-area/web/meta computing and scalable clusters. MPI/FT, the system described paper, trades off sufficient coverage against acceptable performance, based on mission requirements constraints. codes are evolved to use MPI/FT features. Non-portable code event handlers recovery management is isolated....
Abstract Advances in computer technologies have enabled scientists to explore research issues their respective domains at scales greater and finer than ever before. The availability of efficient data collection analysis tools presents researchers with vast opportunities process heterogeneous within a distributed environment. To support the by massive computation, suitable scientific workflow system is needed help users manage programs, design reusable procedures experimental tasks. In this...
Phishers continue to alter the source code of web pages used in their attacks mimic changes legitimate websites spoofed organizations and avoid detection by phishing countermeasures. Manipulations can be as subtle or apparent adding removing significant content. To appropriately respond these campaigns, a cadre file matching algorithms is implemented detect based on content, employing custom data set consisting 17,992 targeting 159 different brands. The results experiments using variety...
Plants respond to diverse environmental cues including microbial perturbations by coordinated regulation of thousands genes. These intricate transcriptional regulatory interactions depend on the recognition specific promoter sequences transcription factors. The combinatorial and cooperative action multiple factors defines a network that enables plant cells distinct biological signals. identification immune-related modules in large-scale networks can reveal mechanisms which exposure pathogen...
The Internet of Things (IoT) is becoming a key infrastructure for the development smart ecosystems. However, increased deployment IoT devices with poor security has already rendered them increasingly vulnerable to cyber attacks. In some cases, they can be used as tool committing serious crimes. Although researchers have explored such issues in domain and provided solutions them, there remains need thorough analysis challenges, solutions, open problems this domain. paper, we consider research...