Cited By
View all- Reidys BLiu PHuang JFalsafi BFerdman MLu SWenisch T(2022)RSSD: defend against ransomware with hardware-isolated network-storage codesign and post-attack analysisProceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3503222.3507773(726-739)Online publication date: 28-Feb-2022
- Heo TSchatzberg DNewell ALiu SDhakshinamurthy SNarayanan IBacik JMason CTang CSkarlatos DFalsafi BFerdman MLu SWenisch T(2022)IOCost: block IO control for containers in datacentersProceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3503222.3507727(595-608)Online publication date: 28-Feb-2022
- Zhu GLee SSon YHong JBures MPark JCerny T(2022)An efficient log-structured scheme for disk arraysProceedings of the 37th ACM/SIGAPP Symposium on Applied Computing10.1145/3477314.3507148(1197-1204)Online publication date: 25-Apr-2022
- Show More Cited By