Follow
Phuong Cao
Phuong Cao
National Center for Supercomputing Applications at University of Illinois at Urbana-Champaign
Verified email at illinois.edu - Homepage
Title
Cited by
Cited by
Year
Reliability and security monitoring of virtual machines using hardware architectural invariants
C Pham, ZJ Estrada, P Cao, Z Kalbarczyk, RK Iyer
44th IEEE International Conference on Dependable Systems and Networks (DSN), 2014
602014
Preemptive intrusion detection: Theoretical framework and real-world measurements
P Cao, E Badger, Z Kalbarczyk, R Iyer, A Slagell
ACM Symposium and Bootcamp on the Science of Security (HotSoS), 2015
55*2015
Toward a high availability cloud: Techniques and challenges
C Pham, P Cao, Z Kalbarczyk, RK Iyer
42nd IEEE International Conference on Dependable Systems and Networks (DSN), 2012
332012
CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks
PM Cao, Y Wu, SS Banerjee, J Azoff, A Withers, ZT Kalbarczyk, RK Iyer
16th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2019
312019
Towards an unified security testbed and security analytics framework
P Cao, EC Badger, ZT Kalbarczyk, RK Iyer, A Withers, AJ Slagell
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 24, 2015
17*2015
Mining threat intelligence from billion-scale SSH brute-force attacks
Y Wu
University of Illinois at Urbana-Champaign, 2020
10*2020
On preempting advanced persistent threats using probabilistic graphical models
P Cao
arXiv preprint arXiv:1903.08826, 2019
102019
Personalized password guessing: a new security threat
P Cao, H Li, K Nahrstedt, Z Kalbarczyk, R Iyer, AJ Slagell
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 22, 2014
92014
Predicting ICU admissions for hospitalized COVID-19 patients with a factor graph-based model
Y Cao, P Cao, H Chen, KM Kochendorfer, AB Trotter, WL Galanter, ...
Multimodal AI in healthcare: A paradigm shift in health intelligence, 245-256, 2022
82022
Investigating root causes of authentication failures using a SAML and OIDC observatory
J Basney, P Cao, T Fleury
2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and …, 2020
72020
Taxonomy of fingerprinting techniques for evaluation of smart grid honeypot realism
V Tay, X Li, D Mashima, B Ng, P Cao, Z Kalbarczyk, RK Iyer
2023 IEEE International Conference on Communications, Control, and Computing …, 2023
32023
stealthML: Data-driven Malware for Stealthy Data Exfiltration
K Chung, P Cao, ZT Kalbarczyk, RK Iyer
2023 IEEE International Conference on Cyber Security and Resilience (CSR), 16-21, 2023
32023
SVAuth–A Single-Sign-On Integration Solution with Runtime Verification
S Chen, M McCutchen, P Cao, S Qadeer, RK Iyer
International Conference on Runtime Verification (RV), 349-358, 2017
22017
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center
L Yang, Z Chen, C Wang, Z Zhang, S Booma, P Cao, C Adam, A Withers, ...
33rd USENIX Security Symposium (USENIX Security 24), 1525-1542, 2024
12024
Security Testbed for Preempting Attacks against Supercomputing Infrastructure
P Cao, Z Kalbarczyk, R Iyer
arXiv preprint arXiv:2409.09602, 2024
2024
Dependable Classical-Quantum Computer Systems Engineering
E Giusto, S Nuņez-Corrales, P Cao, A Cilardo, RK Iyer, W Jiang, P Rech, ...
arXiv preprint arXiv:2408.10484, 2024
2024
Post-Quantum Cryptography (PQC) Network Instrument: Measuring PQC Adoption Rates and Identifying Migration Pathways
PC Jakub Sowa, Bach Hoang, Advaith Yeluru, Steven Qie, Anita Nikolich ...
IEEE International Conference on Quantum Computing and Engineering (QCE …, 2024
2024
Basic Research Needs in Quantum Computing and Networking
P Lougovski, O Parekh, J Broz, M Byrd, Y Chembo, WA de Jong, ...
https://www.osti.gov/biblio/2001045, 56-57, 2023
2023
Message from the Industry Chairs
S Jha, W Steiner, P Cao
The system can't perform the operation now. Try again later.
Articles 1–19