User profiles for Indrajit Ray

Indrajit Ray

- Verified email at colostate.edu - Cited by 8349

Indrajit Ray

- Verified email at sta.uwi.edu - Cited by 2256

Dynamic security risk management using bayesian attack graphs

N Poolsappasit, R Dewri, I Ray - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security risk assessment and mitigation are two vital processes that need to be executed to
maintain a productive IT infrastructure. On one hand, models such as attack graphs and …

Optimal security hardening using multi-objective optimization on attack tree models of networks

R Dewri, N Poolsappasit, I Ray, D Whitley - Proceedings of the 14th ACM …, 2007 - dl.acm.org
Researchers have previously looked into the problem of determining if a given set of security
hardening measures can effectively make a networked system secure. Many of them also …

Durability prediction for GFRP reinforcing bars using short-term data of accelerated aging tests

Y Chen, JF Davalos, I Ray - Journal of composites for construction, 2006 - ascelibrary.org
This paper presents a procedure based on the Arrhenius relation to predict the long-term
behavior of glass fiber-reinforced polymer (GFRP) bars in concrete structures, based on short-…

Long-term durability prediction models for GFRP bars in concrete environment

JF Davalos, Y Chen, I Ray - Journal of Composite materials, 2012 - journals.sagepub.com
This article presents a durability study of glass fiber reinforced polymer (GFRP) bars within
concrete environment and provides recommendations for effective accelerated ageing …

Accelerated aging tests for evaluations of durability performance of FRP reinforcing bars for concrete structures

Y Chen, JF Davalos, I Ray, HY Kim - Composite structures, 2007 - Elsevier
This paper presents accelerated aging test results of a durability study on fiber-reinforced
polymer (FRP) reinforcing bars for concrete structures. Bare FRP bars and also bars …

Measuring, analyzing and predicting security vulnerabilities in software systems

OH Alhazmi, YK Malaiya, I Ray - computers & security, 2007 - Elsevier
In this work we examine the feasibility of quantitatively characterizing some aspects of security.
In particular, we investigate if it is possible to predict the number of vulnerabilities that can …

TrustBAC: integrating trust relationships into the RBAC model for access control in open systems

S Chakraborty, I Ray - Proceedings of the eleventh ACM symposium on …, 2006 - dl.acm.org
Conventional access control are suitable for regulating access to resources by known users.However,these
models have often found to be inadequate for open and decentralized multi-…

Assessing vulnerability exploitability risk using software properties

A Younis, YK Malaiya, I Ray - Software Quality Journal, 2016 - Springer
Attacks on computer systems are now attracting increased attention. While the current
trends in software vulnerability discovery indicate that the number of newly discovered …

Behavioral fingerprinting of iot devices

…, M Bachani, J Peterson, H Shirazi, I Ray, I Ray - Proceedings of the …, 2018 - dl.acm.org
The Internet-of-Things (IoT) has brought in new challenges in device identification --what
the device is, and authentication --is the device the one it claims to be. Traditionally, the …

Effect of FRP bar degradation on interface bond with high strength concrete

JF Davalos, Y Chen, I Ray - Cement and Concrete Composites, 2008 - Elsevier
An experimental investigation is described on the durability performance of FRP bar-concrete
interface bond, purposely focused on the surface material degradation of FRP bar by using …