default search action
Amy Babay
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j2]David Tipper, Amy Babay, Balaji Palanisamy, Prashant Krishnamurthy:
Network Connectivity Resilience in Next Generation Backhaul Networks: Challenges and Future Opportunities. IEEE Trans. Netw. Serv. Manag. 21(5): 5321-5334 (2024) - [c18]Aren Alyahya, David Tipper, Amy Babay:
Availability Analysis of Network-Attack-Resilient Byzantine Fault Tolerant Systems. SRDS 2024: 23-39 - [c17]Sahiti Bommareddy, Maher Khan, Huzaifah Nadeem, Benjamin Gilby, Imes Chiu, John W. van de Lindt, Omar Nofal, Mathaios Panteli, Linton Wells, Yair Amir, Amy Babay:
Tolerating Compound Threats in Critical Infrastructure Control Systems. SRDS 2024: 66-79 - 2023
- [j1]David Tipper, Prashant Krishnamurthy, Amy Babay:
Availability Analysis of Multi-Connectivity for Providing URLLC. IEEE Netw. Lett. 5(4): 223-226 (2023) - [c16]Maher Khan, Amy Babay:
Making Intrusion Tolerance Accessible: A Cloud-Based Hybrid Management Approach to Deploying Resilient Systems. SRDS 2023: 254-267 - 2022
- [c15]Amy E. Babay, Michael Dinitz, Aravind Srinivasan, Leonidas Tsepenekas, Anil Vullikanti:
Controlling Epidemic Spread using Probabilistic Diffusion Models on Networks. AISTATS 2022: 11641-11654 - [c14]Faris Alotibi, Alekhya Velagapudi, Akshay Madan, Kuheli Sai, Abhishek Viswanathan, Amy Babay, David Tipper, Prashant Krishnamurthy:
The Impact of COVID-19 on Communication Network Outages. DRCN 2022: 1-8 - [c13]Sahiti Bommareddy, Benjamin Gilby, Maher Khan, Imes Chiu, Mathaios Panteli, John W. van de Lindt, Linton Wells, Yair Amir, Amy Babay:
Data-Centric Analysis of Compound Threats to Critical Infrastructure Control Systems. DSN Workshops 2022: 72-79 - [i4]Konstantinos Pelechrinis, Xin Liu, Prashant Krishnamurthy, Amy Babay:
Spotting Anomalous Trades in NFT Markets: The Case of NBA Topshot. CoRR abs/2202.04013 (2022) - [i3]Amy Babay, Michael Dinitz, Aravind Srinivasan, Leonidas Tsepenekas, Anil Vullikanti:
Controlling Epidemic Spread using Probabilistic Diffusion Models on Networks. CoRR abs/2202.08296 (2022) - 2021
- [c12]Maher Khan, Amy Babay:
Toward Intrusion Tolerance as a Service: Confidentiality in Partially Cloud-Based BFT Systems. DSN 2021: 14-25 - [i2]Amy Babay, Michael Dinitz, Prathyush Sambaturu, Aravind Srinivasan, Leonidas Tsepenekas, Anil Vullikanti:
Fair Disaster Containment via Graph-Cut Problems. CoRR abs/2106.05424 (2021) - 2020
- [c11]Abdulaziz Alqahtani, David Tipper, Katrina Kelly-Pitou, Amy Babay:
Identifying Vulnerable Critical Infrastructure Zones in Smart Cities. DRCN 2020: 1-7
2010 – 2019
- 2019
- [c10]Amy Babay, John L. Schultz, Thomas Tantillo, Samuel Beckley, Eamon Jordan, Kevin Ruddell, Kevin Jordan, Yair Amir:
Deploying Intrusion-Tolerant SCADA for the Power Grid. DSN 2019: 328-335 - 2018
- [c9]Amy Babay, Thomas Tantillo, Trevor Aron, Marco Platania, Yair Amir:
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid. DSN 2018: 255-266 - [c8]Amy Babay, Michael Dinitz, Zeyu Zhang:
Characterizing Demand Graphs for (Fixed-Parameter) Shallow-Light Steiner Network. FSTTCS 2018: 33:1-33:22 - [c7]Amy Babay, Michael Dinitz, Zeyu Zhang:
Brief Announcement: Characterizing Demand Graphs for (Fixed-Parameter) Shallow-Light Steiner Network. ICALP 2018: 104:1-104:4 - [c6]Amy Babay, John L. Schultz, Thomas Tantillo, Yair Amir:
Toward an Intrusion-Tolerant Power Grid: Challenges and Opportunities. ICDCS 2018: 1321-1326 - [i1]Amy Babay, Michael Dinitz, Zeyu Zhang:
Characterizing Demand Graphs for (Fixed-Parameter) Shallow-Light Steiner Network. CoRR abs/1802.10566 (2018) - 2017
- [c5]Amy Babay, Emily Wagner, Michael Dinitz, Yair Amir:
Timely, Reliable, and Cost-Effective Internet Transport Service Using Dissemination Graphs. ICDCS 2017: 1-12 - [c4]Amy Babay, Claudiu Danilov, John Lane, Michal Miskin-Amir, Daniel Obenshain, John L. Schultz, Jonathan Robert Stanton, Thomas Tantillo, Yair Amir:
Structured Overlay Networks for a New Generation of Internet Services. ICDCS 2017: 1771-1779 - 2016
- [c3]Daniel Obenshain, Thomas Tantillo, Amy Babay, John L. Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, Cristina Nita-Rotaru:
Practical Intrusion-Tolerant Networks. ICDCS 2016: 45-56 - [c2]Amy Babay, Yair Amir:
Fast Total Ordering for Modern Data Centers. ICDCS 2016: 669-679 - 2015
- [c1]Amy Babay, Yair Amir:
Fast Total Ordering for Modern Data Centers. ICDCS 2015: 762-763
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-06 02:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint