Dynamic security risk management using bayesian attack graphs N Poolsappasit, R Dewri, I Ray IEEE Transactions on Dependable and Secure Computing 9 (1), 61-74, 2011 | 776 | 2011 |
Measuring, analyzing and predicting security vulnerabilities in software systems OH Alhazmi, YK Malaiya, I Ray computers & security 26 (3), 219-228, 2007 | 362 | 2007 |
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems S Chakraborty, I Ray Proceedings of the eleventh ACM symposium on Access control models and …, 2006 | 349 | 2006 |
Behavioral fingerprinting of iot devices B Bezawada, M Bachani, J Peterson, H Shirazi, I Ray, I Ray Proceedings of the 2018 workshop on attacks and solutions in hardware …, 2018 | 278 | 2018 |
Optimal security hardening using multi-objective optimization on attack tree models of networks R Dewri, N Poolsappasit, I Ray, D Whitley Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 256 | 2007 |
System and methods for automated detection, reasoning and recommendations for resilient cyber systems S Choudhury, K Agarwal, PY Chen, I Ray US Patent 10,855,706, 2020 | 223 | 2020 |
Using attack trees to identify malicious attacks from authorized insiders I Ray, N Poolsapassit Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 201 | 2005 |
The psychology of security for the home computer user AE Howe, I Ray, M Roberts, M Urbanska, Z Byrne 2012 IEEE Symposium on Security and Privacy, 209-223, 2012 | 182 | 2012 |
Constructing Fair-Exchange Protocols for E-commerce via Distributed Computation of RSA Signatures IR Jung-Min Park, Edwin Chong, Howard Siegel 22nd ACM Symposium on Principles of Distributed Computing (PODC), Boston, MA, 2003 | 164* | 2003 |
A vector model of trust for developing trustworthy systems I Ray, S Chakraborty Computer Security–ESORICS 2004: 9th European Symposium on Research in …, 2004 | 143 | 2004 |
Fair exchange in e-commerce I Ray, I Ray ACM SIGecom Exchanges 3 (2), 9-17, 2002 | 121 | 2002 |
Optimal security hardening on attack tree models of networks: a cost-benefit analysis R Dewri, I Ray, N Poolsappasit, D Whitley International Journal of Information Security 11, 167-188, 2012 | 116 | 2012 |
Security vulnerabilities in software systems: A quantitative perspective O Alhazmi, Y Malaiya, I Ray IFIP Annual Conference on Data and Applications Security and Privacy, 281-294, 2005 | 116 | 2005 |
An anonymous and failure resilient fair-exchange e-commerce protocol I Ray, I Ray, N Natarajan Decision Support Systems 39 (3), 267-292, 2005 | 112 | 2005 |
An anonymous electronic voting protocol for voting over the internet I Ray, I Ray, N Narasimhamurthi Proceedings Third International Workshop on Advanced Issues of E-Commerce …, 2001 | 112 | 2001 |
A cryptographic solution to implement access control in a hierarchy and more I Ray, I Ray, N Narasimhamurthi Proceedings of the seventh ACM symposium on Access control models and …, 2002 | 110 | 2002 |
Secure logging as a service—delegating log management to the cloud I Ray, K Belyaev, M Strizhov, D Mulamba, M Rajaram IEEE systems journal 7 (2), 323-334, 2013 | 109 | 2013 |
Secure personal data servers: a vision paper T Allard, N Anciaux, L Bouganim, Y Guo, L Le Folgoc, B Nguyen, ... The VLDB Journal 3 (1-2), 25-35, 2010 | 101 | 2010 |
An optimistic fair exchange e-commerce protocol with automated dispute resolution I Ray, I Ray International Conference on Electronic Commerce and Web Technologies, 84-93, 2000 | 92 | 2000 |
Query m-invariance: Preventing query disclosures in continuous location-based services R Dewri, I Ray, I Ray, D Whitley 2010 eleventh international conference on mobile data management, 95-104, 2010 | 86 | 2010 |