Aspen Olmsted

Orcid: 0000-0003-2652-0154

According to our database1, Aspen Olmsted authored at least 48 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Mitigating the Effects of Ransomware Attacks on Healthcare Systems.
CoRR, 2022

Safeguarding National Security Interests Utilizing Location-Aware Camera Devices.
Proceedings of the Future Technologies Conference, 2022

2021
Examining Autonomous Vehicle Operating Systems Vulnerabilities using a Cyber-Physical Approach.
Proceedings of the 24th IEEE International Intelligent Transportation Systems Conference, 2021

2017
Designing an assembly language using MIT App inventor.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Handling an organization's communication needs with a single web service.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Efficient retrieval of information from hierarchical REST requests.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Venmo: Exposing a user's lifestyle.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Bot or not.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Detection of fake online hotel reviews.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Classification of music by composer using fuzzy min-max neural networks.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Assessment of fuzzy min-max neural networks for classification tasks.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Distributed query processing and data sharing.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Automation of cyber-reconnaissance: A Java-based open source tool for information gathering.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Optimizing synchronization of cloud storage services: Combining benchmark monitoring and learning-based framework.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Entity identity, performance, and storage.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

shinySDM: Point and click species distribution modeling.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Performance vs. security: Implementing an immutable database in MySQL.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Avoiding unnecessary deaths: Drag-Back, a deadlock avoidance model.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Evaluate action primitives for human activity recognition using unsupervised learning approach.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Low-cost detection of backdoor malware.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Meaningful sandbox data.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Three factor authentication.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Effects of lexicon size on solving bananagrams.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Classifying influenza outbreaks by analyzing and filtering Twitter data.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Database multi-factor authentication via pluggable authentication modules.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Weighing the shopping benefits of a smarter refrigerator.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Considerations for OS<sup>V</sup> over Linux-based virtual machines.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Ethereum transaction graph analysis.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Client side calculation of 'bacon number'.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Spark framework for transcriptomic trimming algorithm reduces cost of reading multiple input files.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Docker vs. KVM: Apache spark application performance and ease of use.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Mobile multi-factor authentication.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Improve CRUD performance on hierarchical data: Nested interval model vs. nested set model.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

2016
Modeling cloud applications for partition contingency.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Temporal resource scheduling equity.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

2015
Founding a cybersecurity club in a higher education environment: A case study.
Proceedings of the 2015 World Congress on Internet Security, 2015

Ecurrency threat modeling and hardening.
Proceedings of the 2015 World Congress on Internet Security, 2015

Keynote speaker 2: Secure software engineering in the cloud.
Proceedings of the 2015 World Congress on Internet Security, 2015

Keynote speaker 3.
Proceedings of the 2015 World Congress on Industrial Control Systems Security, 2015

Long running, consistent, web service transactions.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Keynote speaker 3: Secure software engineering in the cloud.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

HeartSync: Mobile pacemaker failure detector.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

2014
Highly available, consistent, business rule filters.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
Coarse Grained Web Service Availability, Consistency, and Durability.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Web Service constraint optimization.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
The cost of increased transactional correctness and durability in distributed databases.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

High volume web service resource consumption.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

gLIMS: Google cloud-based laboratory information management system for NMR metabolomics.
Proceedings of the ACM International Conference on Bioinformatics, 2012


  Loading...