עקוב אחר
Indrajit Ray
Indrajit Ray
Professor, Computer Science, Colorado State University
כתובת אימייל מאומתת בדומיין colostate.edu - דף הבית
כותרת
צוטט על ידי
צוטט על ידי
שנה
Dynamic security risk management using bayesian attack graphs
N Poolsappasit, R Dewri, I Ray
IEEE Transactions on Dependable and Secure Computing 9 (1), 61-74, 2011
8082011
Measuring, analyzing and predicting security vulnerabilities in software systems
OH Alhazmi, YK Malaiya, I Ray
computers & security 26 (3), 219-228, 2007
3672007
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
S Chakraborty, I Ray
Proceedings of the eleventh ACM symposium on Access control models and …, 2006
3532006
Behavioral fingerprinting of iot devices
B Bezawada, M Bachani, J Peterson, H Shirazi, I Ray, I Ray
Proceedings of the 2018 workshop on attacks and solutions in hardware …, 2018
3212018
Optimal security hardening using multi-objective optimization on attack tree models of networks
R Dewri, N Poolsappasit, I Ray, D Whitley
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2652007
System and methods for automated detection, reasoning and recommendations for resilient cyber systems
S Choudhury, K Agarwal, PY Chen, I Ray
US Patent 10,855,706, 2020
2502020
Using attack trees to identify malicious attacks from authorized insiders
I Ray, N Poolsapassit
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
2042005
The psychology of security for the home computer user
AE Howe, I Ray, M Roberts, M Urbanska, Z Byrne
2012 IEEE Symposium on Security and Privacy, 209-223, 2012
1922012
Constructing Fair-Exchange Protocols for E-commerce via Distributed Computation of RSA Signatures
IR Jung-Min Park, Edwin Chong, Howard Siegel
22nd ACM Symposium on Principles of Distributed Computing (PODC), Boston, MA, 2003
169*2003
A vector model of trust for developing trustworthy systems
I Ray, S Chakraborty
Computer Security–ESORICS 2004: 9th European Symposium on Research in …, 2004
1452004
Optimal security hardening on attack tree models of networks: a cost-benefit analysis
R Dewri, I Ray, N Poolsappasit, D Whitley
International Journal of Information Security 11, 167-188, 2012
1232012
Fair exchange in e-commerce
I Ray, I Ray
ACM SIGecom Exchanges 3 (2), 9-17, 2002
1222002
Security vulnerabilities in software systems: A quantitative perspective
O Alhazmi, Y Malaiya, I Ray
IFIP Annual Conference on Data and Applications Security and Privacy, 281-294, 2005
1162005
An anonymous and failure resilient fair-exchange e-commerce protocol
I Ray, I Ray, N Natarajan
Decision Support Systems 39 (3), 267-292, 2005
1122005
A cryptographic solution to implement access control in a hierarchy and more
I Ray, I Ray, N Narasimhamurthi
Proceedings of the seventh ACM symposium on Access control models and …, 2002
1122002
An anonymous electronic voting protocol for voting over the internet
I Ray, I Ray, N Narasimhamurthi
Proceedings Third International Workshop on Advanced Issues of E-Commerce …, 2001
1122001
Secure logging as a service—delegating log management to the cloud
I Ray, K Belyaev, M Strizhov, D Mulamba, M Rajaram
IEEE systems journal 7 (2), 323-334, 2013
1082013
Secure personal data servers: a vision paper
T Allard, N Anciaux, L Bouganim, Y Guo, L Le Folgoc, B Nguyen, ...
The VLDB Journal 3 (1-2), 25-35, 2010
1072010
An optimistic fair exchange e-commerce protocol with automated dispute resolution
I Ray, I Ray
International Conference on Electronic Commerce and Web Technologies, 84-93, 2000
932000
Assessing vulnerability exploitability risk using software properties
A Younis, YK Malaiya, I Ray
Software Quality Journal 24, 159-202, 2016
862016
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20