Uttam Thakore

Former group member (Ph.D., 2020).
Now with Facebook.

Publications with the Performability Engineering Research Group

An Actor-Centric, Asset-Based Monitor Deployment Model for Cloud Computing.
U. Thakore, G. A. Weaver, and W. H. Sanders. (13THA01)
Proceedings of the 6th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2013), Dresden, Germany, Dec. 9-12, 2013, pp. 311-312. [IEEE Xplore entry]

An Actor-Centric, Asset-Based Monitor Deployment Model for Cloud Computing.
U. Thakore, G. A. Weaver, and W. H. Sanders. (14THA01)
University of Illinois at Urbana-Champaign Coordinated Science Laboratory technical report UILU-ENG-14-2202, July 2014.

A Quantitative Methodology for Evaluating and Deploying Security Monitors.
U. Thakore. (15THA01)
M.S. thesis, University of Illinois at Urbana-Champaign, 2015.

Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data.
A. Bohara, U. Thakore, and W. H. Sanders. (16BOH01)
Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS), Pittsburgh, Pennsylvania, April 19-21, 2016, pp. 7-16. [ACM DOI: http://dx.doi.org/10.1145/2898375.2898400]

A Quantitative Methodology for Security Monitor Deployment.
U. Thakore, G. A. Weaver, and W. H. Sanders. (15THA03)
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Toulouse, France, June 28-July 1, 2016, pp. 1-12. Winner of the DSN 2016 Best Paper Award. [IEEE Xplore entry]

ATTAIN: An Attack Injection Framework for Software-defined Networking.
B. E. Ujcich, U. Thakore, and W. H. Sanders. (16UJC03)
Proceedings of the 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, Colorado, June 26-29, 2017, pp. 567-578. [IEEE Xplore entry]

Poster: Detecting Monitor Compromise Using Evidential Reasoning.
U. Thakore, A. Fawaz, and W. H. Sanders. (18THA01)
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security (HotSoS ’18), Raleigh, North Carolina, April 10-11, 2018, article no. 16. [ACM DOI: https://doi.org/10.1145/3190619.3191693]

Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs.
C. Cheh, U. Thakore, A. Fawaz, B. Chen, W. G. Temple, and W. H. Sanders. (18CHE01)
ACM Transactions on Modeling and Computer Simulation,vol. 29, no. 4, December 2019, article no. 26. [ACM: https://doi.org/10.1145/3309540]

Leveraging Physical Access Logs to Identify Tailgating: Limitations and Solutions.
C. Cheh, U. Thakore, B. Chen, W. G. Temple, and W. H. Sanders. (19CHE01)
Proceedings of the 2019 15th European Dependable Computing Conference (EDCC), Naples, Italy, September 17-20, 2019, pp. 127-132. [IEEE Xplore entry]

Combining Learning and Model-Based Reasoning to Reduce Uncertainties in Cloud Security and Compliance Auditing.
U. Thakore, R. Ranchal, Y.-H. Wei and H. V. Ramasamy. (19THA01)
Proceedings of the 38th IEEE Symposium on Reliable Distributed Systems (SRDS 2019), Lyon, France, Oct. 1-4, 2019, pp. 269-274. [IEEE Xplore entry]

Coordinated Analysis of Heterogeneous Monitor Data in Enterprise Clouds for Incident Response.
U. Thakore, H. V. Ramasamy, and W. H. Sanders. (19THA02)
Proceedings of the 30th International Symposium on Software Reliability Engineering Workshops (ISSREW), Berlin, Germany, October 28-31, 2019, pp. 53-58. [IEEE Xplore entry]

Improving Reliability and Security Monitoring in Enterprise and Cloud Systems by Leveraging Information Redundancy.
U. Thakore. (20THA02)
Ph.D. dissertation, University of Illinois at Urbana-Champaign, 2020.


COPYRIGHT NOTICES: The above electronic files are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

The following copyright notice applies to all of the above items that appear in IEEE publications: “Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE.”

With respect to items published by the ACM: Items are © by the authors listed and by the ACM, in the year listed on each item. The files posted here are the authors’ versions of the work. They are posted here for your personal use and are not for redistribution. The definitive Version of Record was published as indicated in the bibliographic citations provided, and is available from the ACM Digital Library from the ACM Digital Object Identifier listed for each publication.