Cited By
View all- Liu JHao XArpaci-Dusseau AArpaci-Dusseau RChajed T(2024)Shadow Filesystems: Recovering from Filesystem Runtime Errors via Robust Alternative ExecutionProceedings of the 16th ACM Workshop on Hot Topics in Storage and File Systems10.1145/3655038.3665942(15-22)Online publication date: 8-Jul-2024
- Ron JSoto-Valero CZhang LBaudry BMonperrus M(2024)Highly Available Blockchain Nodes With N-Version DesignIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.334619521:4(4084-4097)Online publication date: 1-Jul-2024
- Okafor CSchorlemmer TTorres-Arias SDavis JTorres-Arias SMelara MSimon L(2022)SoK: Analysis of Software Supply Chain Security by Establishing Secure Design PropertiesProceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses10.1145/3560835.3564556(15-24)Online publication date: 11-Nov-2022
- Show More Cited By