Author of the publication

Security modeling and quantification of intrusion tolerant systems using attack-response graph.

, and . J. High Speed Networks, 13 (4): 297-308 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network survivability performance evaluation: : a quantitative approach with applications in wireless ad-hoc networks., , and . MSWiM, page 61-68. ACM, (2002)Analyzing Concurrent and Fault-Tolerant Software Using Stochastic Reward Nets., , and . J. Parallel Distributed Comput., 15 (3): 255-269 (1992)Investigating dynamic reliability and availability through state-space models., , and . Comput. Math. Appl., 64 (12): 3701-3716 (2012)Future research directions in design of reliable communication systems., , , , , , , , , and 1 other author(s). Telecommun. Syst., 60 (4): 423-450 (2015)Survivability Modeling with Stochastic Reward Nets., and . WSC, page 807-818. IEEE, (2009)Parametric Sensitivity and Uncertainty Propagation in Dependability Models., , and . VALUETOOLS, ACM, (2016)Phased-Mission System Analysis Using Boolean Algebraic Methods., and . SIGMETRICS, page 98-107. ACM, (1994)Minimizing Completion Time of a Program by Checkpointing and Rejuvenation., , , and . SIGMETRICS, page 252-261. ACM, (1996)Optimizing Software Rejuvenation Policies under Interval Reliability Criteria., , and . UIC/ATC, page 478-485. IEEE Computer Society, (2012)Building a Reliable Message Delivery System Using the CORBA Event Service., , and . IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 1276-1280. Springer, (2000)