Follow
Samik Basu
Samik Basu
Professor of Computer Science, Iowa State University
Verified email at iastate.edu - Homepage
Title
Cited by
Cited by
Year
Model-carrying code: a practical approach for safe execution of untrusted applications
R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney
ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003
2842003
A taxonomy of intrusion response systems
N Stakhanova, S Basu, J Wong
International Journal of Information and Computer Security 1 (1-2), 169-184, 2007
2772007
Deciding choreography realizability
S Basu, T Bultan, M Ouederni
ACM SIGPLAN Notices 47 (1), 191-202, 2012
1852012
A cost-sensitive model for preemptive intrusion response systems
N Stakhanova, S Basu, J Wong
21st International Conference on Advanced Information Networking and …, 2007
1292007
Choreography conformance via synchronizability
S Basu, T Bultan
Proceedings of the 20th international conference on World wide web, 795-804, 2011
992011
Compositional model checking of software product lines using variation point obligations
J Liu, S Basu, RR Lutz
Automated Software Engineering 18 (1), 39-76, 2011
702011
Automated choreographer synthesis for web services composition using i/o automata
S Mitra, R Kumar, S Basu
IEEE International Conference on Web Services (ICWS 2007), 364-371, 2007
682007
On context-specific substitutability of web services
J Pathak, S Basu, V Honavar
IEEE International Conference on Web Services (ICWS 2007), 192-199, 2007
682007
Analysis & detection of SQL injection vulnerabilities via automatic test case generation of programs
M Ruse, T Sarkar, S Basu
2010 10th IEEE/IPSJ International Symposium on Applications and the Internet …, 2010
632010
Modeling web services by iterative reformulation of functional and non-functional requirements
J Pathak, S Basu, V Honavar
International Conference on Service-Oriented Computing, 314-326, 2006
602006
A framework for cost sensitive assessment of intrusion response selection
C Strasburg, N Stakhanova, S Basu, JS Wong
2009 33rd Annual IEEE international computer software and applications …, 2009
582009
Cross-layer based anomaly detection in wireless mesh networks
X Wang, JS Wong, F Stanley, S Basu
2009 Ninth Annual International Symposium on Applications and the Internet, 9-15, 2009
572009
Parallel web service composition in moscoe: A choreography-based approach
J Pathak, S Basu, R Lutz, V Honavar
2006 European Conference on Web Services (ECOWS'06), 3-12, 2006
542006
Intrusion response cost assessment methodology
C Strasburg, N Stakhanova, S Basu, JS Wong
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
472009
Synchronizability for Verification of Asynchronously Communicating Systems
S Basu, T Bultan, M Ouederni
Verification, Model Checking and Abstract Interpretation, 2012
462012
On the symbiosis of specification-based and anomaly-based detection
N Stakhanova, S Basu, J Wong
computers & security 29 (2), 253-268, 2010
442010
Trust framework for p2p networks using peer-profile based anomaly technique
N Stakhanova, S Basu, J Wong, O Stakhanov
25th IEEE International Conference on Distributed Computing Systems …, 2005
432005
Dominance testing via model checking
GR Santhanam, S Basu, V Honavar
Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010
412010
Web service substitution based on preferences over non-functional attributes
GR Santhanam, S Basu, V Honavar
2009 IEEE International Conference on Services Computing, 210-217, 2009
372009
Detecting cross-site scripting vulnerability using concolic testing
ME Ruse, S Basu
2013 10th International Conference on Information Technology: New …, 2013
362013
The system can't perform the operation now. Try again later.
Articles 1–20