Model-carrying code: a practical approach for safe execution of untrusted applications R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003 | 284 | 2003 |
A taxonomy of intrusion response systems N Stakhanova, S Basu, J Wong International Journal of Information and Computer Security 1 (1-2), 169-184, 2007 | 279 | 2007 |
Deciding choreography realizability S Basu, T Bultan, M Ouederni ACM SIGPLAN Notices 47 (1), 191-202, 2012 | 187 | 2012 |
A cost-sensitive model for preemptive intrusion response systems N Stakhanova, S Basu, J Wong 21st International Conference on Advanced Information Networking and …, 2007 | 130 | 2007 |
Choreography conformance via synchronizability S Basu, T Bultan Proceedings of the 20th international conference on World wide web, 795-804, 2011 | 101 | 2011 |
Compositional model checking of software product lines using variation point obligations J Liu, S Basu, RR Lutz Automated Software Engineering 18 (1), 39-76, 2011 | 71 | 2011 |
Automated choreographer synthesis for web services composition using i/o automata S Mitra, R Kumar, S Basu IEEE International Conference on Web Services (ICWS 2007), 364-371, 2007 | 68 | 2007 |
On context-specific substitutability of web services J Pathak, S Basu, V Honavar IEEE International Conference on Web Services (ICWS 2007), 192-199, 2007 | 68 | 2007 |
Analysis & detection of SQL injection vulnerabilities via automatic test case generation of programs M Ruse, T Sarkar, S Basu 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet …, 2010 | 65 | 2010 |
Modeling web services by iterative reformulation of functional and non-functional requirements J Pathak, S Basu, V Honavar International Conference on Service-Oriented Computing, 314-326, 2006 | 61 | 2006 |
A framework for cost sensitive assessment of intrusion response selection C Strasburg, N Stakhanova, S Basu, JS Wong 2009 33rd Annual IEEE international computer software and applications …, 2009 | 59 | 2009 |
Cross-layer based anomaly detection in wireless mesh networks X Wang, JS Wong, F Stanley, S Basu 2009 Ninth Annual International Symposium on Applications and the Internet, 9-15, 2009 | 57 | 2009 |
Parallel web service composition in moscoe: A choreography-based approach J Pathak, S Basu, R Lutz, V Honavar 2006 European Conference on Web Services (ECOWS'06), 3-12, 2006 | 54 | 2006 |
Intrusion response cost assessment methodology C Strasburg, N Stakhanova, S Basu, JS Wong Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 48 | 2009 |
Synchronizability for Verification of Asynchronously Communicating Systems S Basu, T Bultan, M Ouederni Verification, Model Checking and Abstract Interpretation, 2012 | 46 | 2012 |
On the symbiosis of specification-based and anomaly-based detection N Stakhanova, S Basu, J Wong computers & security 29 (2), 253-268, 2010 | 44 | 2010 |
Trust framework for p2p networks using peer-profile based anomaly technique N Stakhanova, S Basu, J Wong, O Stakhanov 25th IEEE International Conference on Distributed Computing Systems …, 2005 | 43 | 2005 |
Dominance testing via model checking GR Santhanam, S Basu, V Honavar Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010 | 41 | 2010 |
Detecting cross-site scripting vulnerability using concolic testing ME Ruse, S Basu 2013 10th International Conference on Information Technology: New …, 2013 | 38 | 2013 |
Web service substitution based on preferences over non-functional attributes GR Santhanam, S Basu, V Honavar 2009 IEEE International Conference on Services Computing, 210-217, 2009 | 37 | 2009 |