Handbook of software reliability engineering MR Lyu IEEE computer society press, 1996 | 3574 | 1996 |
Encyclopedia of cryptography and security HCA Van Tilborg, S Jajodia Springer Science & Business Media, 2014 | 844 | 2014 |
A comparison of machine learning techniques for phishing detection S Abu-Nimeh, D Nappa, X Wang, S Nair Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007 | 638 | 2007 |
Design and evaluation of system-level checks for on-line control flow error detection Z Alkhalifa, VSS Nair, N Krishnamurthy, JA Abraham IEEE Transactions on Parallel and Distributed Systems 10 (6), 627-641, 1999 | 350 | 1999 |
A model for software development effort and cost estimation K Pillai, VSS Nair IEEE Transactions on software engineering 23 (8), 485-497, 1997 | 260 | 1997 |
Real-number codes for fault-tolerant matrix operations on processor arrays VSS Nair, JA Abraham IEEE Transactions on Computers 39 (4), 426-435, 1990 | 203 | 1990 |
Algorithm-based fault tolerance on a hypercube multiprocessor P Banerjee, JT Rahmeh, C Stunkel, VS Nair, K Roy, V Balasubramanian, ... IEEE Transactions on Computers 39 (9), 1132-1145, 1990 | 190 | 1990 |
An extended systematic literature review on provision of evidence for safety certification S Nair, JL De La Vara, M Sabetzadeh, L Briand Information and Software Technology 56 (7), 689-717, 2014 | 153 | 2014 |
Cyber security analytics: a stochastic model for security quantification using absorbing markov chains S Abraham, S Nair Journal of Communications 9 (12), 899-907, 2014 | 102 | 2014 |
A predictive framework for cyber security analytics using attack graphs S Abraham, S Nair arXiv preprint arXiv:1502.01240, 2015 | 96 | 2015 |
A review of traceability research at the requirements engineering conferencere@21 S Nair, JL De La Vara, S Sen 2013 21st IEEE International Requirements Engineering Conference (RE), 222-229, 2013 | 92 | 2013 |
Evidence management for compliance of critical systems with safety standards: A survey on the state of practice S Nair, JL de la Vara, M Sabetzadeh, D Falessi Information and Software Technology 60, 1-15, 2015 | 88 | 2015 |
Traffic engineering in metro ethernet M Ali, G Chiruvolu, A Ge IEEE network 19 (2), 10-17, 2005 | 87 | 2005 |
Security in distributed, grid, mobile, and pervasive computing Y Xiao CRC Press, 2007 | 75 | 2007 |
Efficient calculation of spectral coefficients and their applications MA Thornton, VSS Nair IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 1995 | 73 | 1995 |
Evaluation of integrated system-level checks for on-line error detection GA Kanawati, VSS Nair, N Krishnamurthy, JA Abraham Proceedings of IEEE International Computer Performance and Dependability …, 1996 | 63 | 1996 |
An evidential reasoning approach for assessing confidence in safety evidence S Nair, N Walkinshaw, T Kelly, JL de la Vara 2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015 | 56 | 2015 |
An evaluation of system-level fault tolerance on the Intel hypercube multiprocessor P Banerjee, JT Rahmeh, CB Stunkel, VSS Nair, K Roy, JA Abraham [1988] The Eighteenth International Symposium on Fault-Tolerant Computing …, 1988 | 55 | 1988 |
Network traffic behavioral analytics for detection of DDoS attacks AD Lopez, AP Mohan, S Nair SMU data science review 2 (1), 14, 2019 | 48 | 2019 |
Bypassing security toolbars and phishing filters via dns poisoning S Abu-Nimeh, S Nair IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008 | 48 | 2008 |