Follow
Samik Basu
Samik Basu
Professor of Computer Science, Iowa State University
Verified email at iastate.edu - Homepage
Title
Cited by
Cited by
Year
Model-carrying code: a practical approach for safe execution of untrusted applications
R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney
ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003
2772003
A taxonomy of intrusion response systems
N Stakhanova, S Basu, J Wong
International Journal of Information and Computer Security 1 (1-2), 169-184, 2007
2592007
Deciding choreography realizability
S Basu, T Bultan, M Ouederni
ACM SIGPLAN Notices 47 (1), 191-202, 2012
1692012
A cost-sensitive model for preemptive intrusion response systems
N Stakhanova, S Basu, J Wong
21st International Conference on Advanced Information Networking and …, 2007
1232007
Choreography conformance via synchronizability
S Basu, T Bultan
Proceedings of the 20th international conference on World wide web, 795-804, 2011
912011
Automated choreographer synthesis for web services composition using i/o automata
S Mitra, R Kumar, S Basu
IEEE International Conference on Web Services (ICWS 2007), 364-371, 2007
672007
On context-specific substitutability of web services
J Pathak, S Basu, V Honavar
IEEE International Conference on Web Services (ICWS 2007), 192-199, 2007
662007
Compositional model checking of software product lines using variation point obligations
J Liu, S Basu, RR Lutz
Automated Software Engineering 18 (1), 39-76, 2011
652011
Modeling web services by iterative reformulation of functional and non-functional requirements
J Pathak, S Basu, V Honavar
International Conference on Service-Oriented Computing, 314-326, 2006
592006
Analysis & detection of SQL injection vulnerabilities via automatic test case generation of programs
M Ruse, T Sarkar, S Basu
2010 10th IEEE/IPSJ International Symposium on Applications and the Internet …, 2010
582010
Cross-layer based anomaly detection in wireless mesh networks
X Wang, JS Wong, F Stanley, S Basu
2009 Ninth Annual International Symposium on Applications and the Internet, 9-15, 2009
562009
A framework for cost sensitive assessment of intrusion response selection
C Strasburg, N Stakhanova, S Basu, JS Wong
2009 33rd Annual IEEE international computer software and applications …, 2009
522009
Parallel web service composition in moscoe: A choreography-based approach
J Pathak, S Basu, R Lutz, V Honavar
2006 European Conference on Web Services (ECOWS'06), 3-12, 2006
522006
Trust framework for p2p networks using peer-profile based anomaly technique
N Stakhanova, S Basu, J Wong, O Stakhanov
25th IEEE International Conference on Distributed Computing Systems …, 2005
452005
Synchronizability for Verification of Asynchronously Communicating Systems
S Basu, T Bultan, M Ouederni
Verification, Model Checking and Abstract Interpretation, 2012
422012
On the symbiosis of specification-based and anomaly-based detection
N Stakhanova, S Basu, J Wong
computers & security 29 (2), 253-268, 2010
422010
Intrusion response cost assessment methodology
C Strasburg, N Stakhanova, S Basu, JS Wong
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
412009
Dominance testing via model checking
GR Santhanam, S Basu, V Honavar
Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010
38*2010
Web service substitution based on preferences over non-functional attributes
GR Santhanam, S Basu, V Honavar
2009 IEEE International Conference on Services Computing, 210-217, 2009
372009
Detecting cross-site scripting vulnerability using concolic testing
ME Ruse, S Basu
2013 10th International Conference on Information Technology: New …, 2013
342013
The system can't perform the operation now. Try again later.
Articles 1–20