{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:16:12Z","timestamp":1730301372135,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/uemcon.2017.8249003","type":"proceedings-article","created":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T00:14:25Z","timestamp":1519085665000},"page":"109-114","source":"Crossref","is-referenced-by-count":2,"title":["Data analysis of cyber-activity within high performance computing environments"],"prefix":"10.1109","author":[{"given":"L.","family":"Ji","sequence":"first","affiliation":[]},{"given":"S.","family":"Kolhe","sequence":"additional","affiliation":[]},{"given":"A. D.","family":"Clark","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/1964218.1964225","article-title":"The structural simulation toolkit","volume":"38","author":"rodrigues","year":"2011","journal-title":"ACM Sigmetrics Performance Evaluation Review"},{"journal-title":"Residuals and Influence in Regression","year":"1982","author":"cook","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2016.7761604"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/32.387474"},{"key":"ref11","article-title":"Why do internet services fail, and what can be done about it?","volume":"67","author":"oppenheimer","year":"2003","journal-title":"USENIX Symposium on Internet Technologies and Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/78\/1\/012022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/24.556579"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1999.805094"},{"key":"ref15","first-page":"178","article-title":"Networked windows nt system field failure data analysis","author":"xu","year":"1999","journal-title":"Dependable Computing 1999 Proceedings 1999 Pacific Rim International Symposium On IEEE"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2005.0051"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2005.1556914"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2008.09.025"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.06.0206.0026"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752397"},{"journal-title":"IBM Power Systems 775 for AIX and Linux HPC Solution","year":"2014","author":"quintero","key":"ref4"},{"key":"ref27","article-title":"Evaluation of the cmle row constant model","author":"pritchett-sheats","year":"2013","journal-title":"Los Alamos National Laboratory (Technical Report)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/24.58719"},{"key":"ref6","article-title":"System characterization of malicious behavior in supercomputing environments","author":"clark","year":"2018","journal-title":"Surveillance in Action"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2307\/2684934"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2008.103"},{"key":"ref8","first-page":"3","article-title":"Why do computers stop and what can be done about it?","author":"gray","year":"1986","journal-title":"Symposium on Reliability in Distributed Software and Database Systems"},{"key":"ref7","first-page":"43","article-title":"Probabilistic logics and the synthesis of reliable organisms from unreliable components","volume":"34","author":"neumann","year":"1956","journal-title":"Automata Studies"},{"journal-title":"Supercomputers face growing resilience problems","year":"2012","author":"jackson","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/2.585151"},{"key":"ref1","article-title":"High-end computing resilience: Analysis of issues facing the hec community and path-forward for research and development","author":"debardeleben","year":"2009","journal-title":"Whitepaper"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2007.02.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.032"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2009.06.011"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0203-z"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-1346-2_8"},{"key":"ref26","article-title":"A theoretical representation of the effects of targeted failures in hpc systems","author":"clark","year":"2016","journal-title":"Handbook of Research on Next-Generation High Performance Computing IGI Global"},{"key":"ref25","article-title":"The price of anarchy and malice: A game theoretic study of targeted failures in hpc systems","author":"faissol","year":"2014","journal-title":"Lawrence Livermore National Laboratory Report"}],"event":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","start":{"date-parts":[[2017,10,19]]},"location":"New York, NY","end":{"date-parts":[[2017,10,21]]}},"container-title":["2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8234833\/8248967\/08249003.pdf?arnumber=8249003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T06:07:51Z","timestamp":1598249271000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8249003\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/uemcon.2017.8249003","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}