{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:05:13Z","timestamp":1757455513785,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T00:00:00Z","timestamp":1560729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1547272 1642070 1642053 1642090 1813537 1823385"],"award-info":[{"award-number":["1547272 1642070 1642053 1642090 1813537 1823385"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,17]]},"DOI":"10.1145\/3322790.3330593","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T12:45:07Z","timestamp":1561121107000},"page":"13-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Initial Thoughts on Cybersecurity And Reproducibility"],"prefix":"10.1145","author":[{"given":"Ewa","family":"Deelman","sequence":"first","affiliation":[{"name":"Information Sciences Institute, Los Angeles, CA, USA"}]},{"given":"Victoria","family":"Stodden","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Michela","family":"Taufer","sequence":"additional","affiliation":[{"name":"The University of Tennessee Knoxville, Knoxville, TN, USA"}]},{"given":"Von","family":"Welch","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Peter Bright. 2018. Here's how and why the Spectre and Meltdown patches will hurt performance. https:\/\/arstechnica.com\/gadgets\/2018\/01\/heres-how-and-why-the-spectre-and-meltdown-patches-will-hurt-performance\/. Accessed: 2019--4--8.  Peter Bright. 2018. Here's how and why the Spectre and Meltdown patches will hurt performance. https:\/\/arstechnica.com\/gadgets\/2018\/01\/heres-how-and-why-the-spectre-and-meltdown-patches-will-hurt-performance\/. Accessed: 2019--4--8."},{"key":"e_1_3_2_1_2_1","volume-title":"Data for Cybersecurity Research: Process and Wish List. (01","author":"Camp L","year":"2009","unstructured":"L Camp , Lorrie Cranor , Nick Feamster , Joan Feigenbaum , Stephanie Forrest , Dave Kotz , Wenke Lee , Patrick Lincoln , Vern Paxson , Mike Reiter , and others. 2009. Data for Cybersecurity Research: Process and Wish List. (01 2009 ). L Camp, Lorrie Cranor, Nick Feamster, Joan Feigenbaum, Stephanie Forrest, Dave Kotz, Wenke Lee, Patrick Lincoln, Vern Paxson, Mike Reiter, and others. 2009. Data for Cybersecurity Research: Process and Wish List. (01 2009)."},{"key":"e_1_3_2_1_3_1","volume-title":"Anonymous: Still Trolling After All These Years. https:\/\/gizmodo.com\/anonymous-still-trolling-after-all-these-years-1700374189. Accessed: 2018--4--2.","author":"Estes Adam Clark","year":"2015","unstructured":"Adam Clark Estes . 2015 . Anonymous: Still Trolling After All These Years. https:\/\/gizmodo.com\/anonymous-still-trolling-after-all-these-years-1700374189. Accessed: 2018--4--2. Adam Clark Estes. 2015. Anonymous: Still Trolling After All These Years. https:\/\/gizmodo.com\/anonymous-still-trolling-after-all-these-years-1700374189. Accessed: 2018--4--2."},{"key":"e_1_3_2_1_4_1","unstructured":"Jeffrey Mervis. 2019. Can a set of equations keep U.S. census data private? https:\/\/www.sciencemag.org\/news\/2019\/01\/can-set-equations-keep-us-census-data-private. Accessed: 2019--4--6.  Jeffrey Mervis. 2019. Can a set of equations keep U.S. census data private? https:\/\/www.sciencemag.org\/news\/2019\/01\/can-set-equations-keep-us-census-data-private. Accessed: 2019--4--6."},{"key":"e_1_3_2_1_5_1","volume-title":"Research firm releases new details on alleged Iranian hacking campaign targeting 300 universities. The Washington Post (March","author":"Nakashima Ellen","year":"2018","unstructured":"Ellen Nakashima . 2018. Research firm releases new details on alleged Iranian hacking campaign targeting 300 universities. The Washington Post (March 2018 ). Ellen Nakashima. 2018. Research firm releases new details on alleged Iranian hacking campaign targeting 300 universities. The Washington Post (March 2018)."},{"volume-title":"Reproducibility and Replicability in Science","author":"Engineering National Academies of Sciences and Medicine. 2019.","key":"e_1_3_2_1_6_1","unstructured":"Engineering National Academies of Sciences and Medicine. 2019. Reproducibility and Replicability in Science . The National Academies Press , Washington, DC . Engineering National Academies of Sciences and Medicine. 2019. Reproducibility and Replicability in Science .The National Academies Press, Washington, DC."},{"key":"e_1_3_2_1_7_1","unstructured":"U.S. Department of Health and Human Services. 2015. Health Information Privacy. https:\/\/www.hhs.gov\/hipaa\/index.html. Accessed: 2019--4--8.  U.S. Department of Health and Human Services. 2015. Health Information Privacy. https:\/\/www.hhs.gov\/hipaa\/index.html. Accessed: 2019--4--8."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73269-5_19"},{"key":"e_1_3_2_1_9_1","volume-title":"How cyber attackers almost stole a unique chance from Australian astrophysicists. ABC News (Oct","author":"Perpitch Nicolas","year":"2017","unstructured":"Nicolas Perpitch . 2017. How cyber attackers almost stole a unique chance from Australian astrophysicists. ABC News (Oct . 2017 ). Nicolas Perpitch. 2017. How cyber attackers almost stole a unique chance from Australian astrophysicists. ABC News (Oct. 2017)."},{"key":"e_1_3_2_1_10_1","unstructured":"Trusted CI Project. 2019. Trusted CI: the NSF Cybersecurity Center of Excellence. http:\/\/trustedci.org. Accessed: 2019--4--6.  Trusted CI Project. 2019. Trusted CI: the NSF Cybersecurity Center of Excellence. http:\/\/trustedci.org. Accessed: 2019--4--6."},{"key":"e_1_3_2_1_11_1","unstructured":"Suan Ramsey. 2015. Anatomy of a Breach: Lessons Learned. 2015 NSF Cybersecurity Summit.  Suan Ramsey. 2015. Anatomy of a Breach: Lessons Learned. 2015 NSF Cybersecurity Summit."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29889-9_15"},{"volume-title":"d.}. The Legal Framework for Reproducible Scientific Research","author":"Stodden Victoria","key":"e_1_3_2_1_14_1","unstructured":"Victoria Stodden . {n. d.}. The Legal Framework for Reproducible Scientific Research . IEEE Computing in Science and Engineering , Vol. 11 , 1 ( {n. d.}), 35--40. Victoria Stodden. {n. d.}. The Legal Framework for Reproducible Scientific Research. IEEE Computing in Science and Engineering, Vol. 11, 1 ( {n. d.}), 35--40."},{"key":"e_1_3_2_1_15_1","unstructured":"Victoria Stodden. 2013. Resolving Irreproducibility in Empirical and Computational Research \u00ab IMS Bulletin. http:\/\/bulletin.imstat.org\/2013\/11\/resolving-irreproducibility-in-empirical-and-computational-research\/. Accessed: 2019--4--6.  Victoria Stodden. 2013. Resolving Irreproducibility in Empirical and Computational Research \u00ab IMS Bulletin. http:\/\/bulletin.imstat.org\/2013\/11\/resolving-irreproducibility-in-empirical-and-computational-research\/. Accessed: 2019--4--6."},{"key":"e_1_3_2_1_16_1","volume-title":"Peng","author":"Stodden Victoria","year":"2014","unstructured":"Victoria Stodden , Friedrich Leisch , and Roger D . Peng . 2014 . Implementing reproducible research. CRC Press\/Taylor and Francis , Boca Raton, FL. Victoria Stodden, Friedrich Leisch, and Roger D. Peng. 2014. Implementing reproducible research. CRC Press\/Taylor and Francis, Boca Raton, FL."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/347057.347561"},{"key":"e_1_3_2_1_18_1","volume-title":"Computer Security: Virtual Misconduct -- Real Consequences. https:\/\/home.cern\/news\/news\/computing\/computer-security-virtual-misconduct-real-consequences. Accessed: 2019--4--6.","author":"Computer Security Team CERN","year":"2017","unstructured":"CERN Computer Security Team . 2017 . Computer Security: Virtual Misconduct -- Real Consequences. https:\/\/home.cern\/news\/news\/computing\/computer-security-virtual-misconduct-real-consequences. Accessed: 2019--4--6. CERN Computer Security Team. 2017. Computer Security: Virtual Misconduct -- Real Consequences. https:\/\/home.cern\/news\/news\/computing\/computer-security-virtual-misconduct-real-consequences. Accessed: 2019--4--6."},{"key":"e_1_3_2_1_19_1","unstructured":"Tiffany Trader. 2014. US Researcher Caught Mining for Bitcoins on NSF Iron. https:\/\/www.hpcwire.com\/2014\/06\/09\/us-researcher-caught-mining-bitcoins-nsf-iron\/. Accessed: 2018--6--21.  Tiffany Trader. 2014. US Researcher Caught Mining for Bitcoins on NSF Iron. https:\/\/www.hpcwire.com\/2014\/06\/09\/us-researcher-caught-mining-bitcoins-nsf-iron\/. Accessed: 2018--6--21."},{"key":"e_1_3_2_1_20_1","volume-title":"Definition: Cybersecurity. Retrieved from Gartner. com website: https:\/\/www.gartner.com\/doc\/2510116\/definition-cybersecurity","author":"Walls A","year":"2013","unstructured":"A Walls , E Perkins , and J Weiss . 2013 . Definition: Cybersecurity. Retrieved from Gartner. com website: https:\/\/www.gartner.com\/doc\/2510116\/definition-cybersecurity (2013). A Walls, E Perkins, and J Weiss. 2013. Definition: Cybersecurity. Retrieved from Gartner. com website: https:\/\/www.gartner.com\/doc\/2510116\/definition-cybersecurity (2013)."}],"event":{"name":"HPDC '19: The 28th International Symposium on High-Performance Parallel and Distributed Computing","sponsor":["University of Arizona University of Arizona","SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Phoenix AZ USA","acronym":"HPDC '19"},"container-title":["Proceedings of the 2nd International Workshop on Practical Reproducible Evaluation of Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322790.3330593","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3322790.3330593","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3322790.3330593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:25Z","timestamp":1750208545000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322790.3330593"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,17]]},"references-count":19,"alternative-id":["10.1145\/3322790.3330593","10.1145\/3322790"],"URL":"https:\/\/doi.org\/10.1145\/3322790.3330593","relation":{},"subject":[],"published":{"date-parts":[[2019,6,17]]},"assertion":[{"value":"2019-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}