Dynamic security risk management using bayesian attack graphs
Security risk assessment and mitigation are two vital processes that need to be executed to
maintain a productive IT infrastructure. On one hand, models such as attack graphs and …
maintain a productive IT infrastructure. On one hand, models such as attack graphs and …
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security
hardening measures can effectively make a networked system secure. Many of them also …
hardening measures can effectively make a networked system secure. Many of them also …
Durability prediction for GFRP reinforcing bars using short-term data of accelerated aging tests
This paper presents a procedure based on the Arrhenius relation to predict the long-term
behavior of glass fiber-reinforced polymer (GFRP) bars in concrete structures, based on short-…
behavior of glass fiber-reinforced polymer (GFRP) bars in concrete structures, based on short-…
Long-term durability prediction models for GFRP bars in concrete environment
This article presents a durability study of glass fiber reinforced polymer (GFRP) bars within
concrete environment and provides recommendations for effective accelerated ageing …
concrete environment and provides recommendations for effective accelerated ageing …
Accelerated aging tests for evaluations of durability performance of FRP reinforcing bars for concrete structures
This paper presents accelerated aging test results of a durability study on fiber-reinforced
polymer (FRP) reinforcing bars for concrete structures. Bare FRP bars and also bars …
polymer (FRP) reinforcing bars for concrete structures. Bare FRP bars and also bars …
Measuring, analyzing and predicting security vulnerabilities in software systems
In this work we examine the feasibility of quantitatively characterizing some aspects of security.
In particular, we investigate if it is possible to predict the number of vulnerabilities that can …
In particular, we investigate if it is possible to predict the number of vulnerabilities that can …
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
S Chakraborty, I Ray - Proceedings of the eleventh ACM symposium on …, 2006 - dl.acm.org
Conventional access control are suitable for regulating access to resources by known users.However,these
models have often found to be inadequate for open and decentralized multi-…
models have often found to be inadequate for open and decentralized multi-…
Assessing vulnerability exploitability risk using software properties
Attacks on computer systems are now attracting increased attention. While the current
trends in software vulnerability discovery indicate that the number of newly discovered …
trends in software vulnerability discovery indicate that the number of newly discovered …
Behavioral fingerprinting of iot devices
The Internet-of-Things (IoT) has brought in new challenges in device identification --what
the device is, and authentication --is the device the one it claims to be. Traditionally, the …
the device is, and authentication --is the device the one it claims to be. Traditionally, the …
Effect of FRP bar degradation on interface bond with high strength concrete
An experimental investigation is described on the durability performance of FRP bar-concrete
interface bond, purposely focused on the surface material degradation of FRP bar by using …
interface bond, purposely focused on the surface material degradation of FRP bar by using …