Obserwuj
Samrat Chatterjee
Tytuł
Cytowane przez
Cytowane przez
Rok
Research Methods for Cyber Security
T Edgar, D Manz
Elsevier, 2017
4712017
Exploratory study
TW Edgar, DO Manz
Research methods for cyber security 29, 95-130, 2017
2172017
Resilience of urban transport network-of-networks under intense flood hazards exacerbated by targeted attacks
N Yadav, S Chatterjee, AR Ganguly
Scientific reports 10 (1), 10350, 2020
882020
Chapter 6-machine learning
TW Edgar, DO Manz
Research methods for cyber security, 153-173, 2017
572017
Economic Consequence Analysis of Disasters: The E-CAT Software Tool
A Rose, F Prager, Z Chen, S Chatterjee, D Wei, N Heatwole, E Warren
Springer, 2017
562017
Economic consequences of aviation system disruptions: A reduced-form computable general equilibrium analysis
Z Chen, AZ Rose, F Prager, S Chatterjee
Transportation Research Part A: Policy and Practice 95, 207-226, 2017
512017
Science and cyber security
TW Edgar, DO Manz
Research methods for cyber security, 33-62, 2017
432017
An iterative learning and inference approach to managing dynamic cyber vulnerabilities of complex systems
S Chatterjee, S Thekdi
Reliability engineering & system safety 193, 106664, 2020
372020
A methodology for modeling regional terrorism risk
S Chatterjee, MD Abkowitz
Risk Analysis: An International Journal 31 (7), 1133-1140, 2011
362011
Development of mix design and testing procedures for cold patching mixtures
S Chatterjee, RP White, A Smit, J Prozzi, JA Prozzi
Report to TxDOT, 2006
362006
Hypergames and Cyber-Physical Security for Control Systems
C Bakker, A Bhattacharya, S Chatterjee, D Vrabie
arXiv preprint, 2018
232018
A framework for analyzing the economic tradeoffs between urban commerce and security against terrorism
A Rose, M Avetisyan, S Chatterjee
Risk Analysis 34 (8), 1554-1579, 2014
232014
Learning and information manipulation: Repeated hypergames for cyber-physical security
C Bakker, A Bhattacharya, S Chatterjee, DL Vrabie
IEEE Control Systems Letters 4 (2), 295-300, 2019
222019
Proactive routing mutation against stealthy distributed denial of service attacks – metrics, modeling, and analysis
Q Duan, E Al-Shaer, S Chatterjee, M Halappanavar, C Oehmen
Journal of Defense Modeling and Simulation, 2017
222017
Formal Approach For Resilient Reachability based on End-System Route Agility
U Rauf, F Gillani, E Al-Shaer, M Halappanavar, S Chatterjee, C Oehmen
Proceedings of Third ACM Workshop on Moving Target Defense (MTD 2016), 2016
222016
Chapter 3—Starting Your Research
TW Edgar, DO Manz
Research methods for cyber security, 63-92, 2017
192017
Disaster risk and artificial intelligence: A framework to characterize conceptual synergies and future opportunities
S Thekdi, U Tatar, J Santos, S Chatterjee
Risk analysis 43 (8), 1641-1656, 2023
182023
Characterization of the impact of soft errors on iterative methods
BO Mutlu, G Kestor, J Manzano, O Unsal, S Chatterjee, S Krishnamoorthy
2018 IEEE 25th International Conference on High Performance Computing (HiPC …, 2018
172018
Convenience sampling
TW Edgar, DO Manz
Research methods for cyber security, 2017
172017
Portfolio analysis of layered security measures
S Chatterjee, SC Hora, H Rosoff
Risk Analysis 35 (3), 459-475, 2015
172015
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20