Publications
Modeling user-perceived service availability." Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3694 LNCS (2005): 107-122.
"Optimization for condition-based maintenance with semi-Markov decision process." Reliability Engineering and System Safety 90, no. 1 (2005): 25-29.
"A proactive approach towards always-on availability in broadband cable networks." Computer Communications 28, no. 1 (2005): 51-64.
"StackOFFence: A technique for defending against buffer overflow attacks." International Conference on Information Technology: Coding and Computing, ITCC 1 (2005): 656-661.
"State space approach to security quantification." Proceedings - International Computer Software and Applications Conference 2 (2005): 83-88.
"Truncated non-homogeneous Poisson process models - properties and performance." Opsearch (India) 42, no. 4 (2005): 310-321.
"A workload-based analysis of software aging, and rejuvenation." IEEE Transactions on Reliability 54, no. 3 (2005): 541-548.
"Workload-based analysis of software aging, and rejuvenation." Ieee Transactions on Reliability 54, no. 3 (2005): 541-548.
"Analysis of software fault removal policies using a non-homogeneous continuous time Markov chain." Software Quality Journal 12, no. 3 (2004): 211-230.
"An analytical approach to architecture-based software performance and reliability prediction." Performance Evaluation 58, no. 4 (2004): 391-412.
"Comparing software rejuvenation policies under different dependability measures." IEICE Transactions on Information and Systems E87-D, no. 8 (2004): 2078-2085.
"Discrete Event Simulation with Application to Computer Communication Systems Performance - Introduction to Simulation." In IFIP Congress Tutorials, 271-304. Vol. 157. 2004.
"Discrete event simulation with application to computer communication systems performance: Introduction to simulation." In Ifip Advances in Information and Communication Technology, 271-304. Vol. 157. 2004.
"Discrete event simulation with application to computer communication systems performance - Introduction to simulation." In INFORMATION TECHNOLOGY: SELECTED TUTORIALS, 271-304. Vol. 157. 2004.
"The effect of access delay in capacity-on-demand access over a wireless link under bursty packet-switched data." Performance Evaluation 57, no. 1 (2004): 69-87.
"A General Framework for Network Survivability Quantification." In MMB, 369-378. 2004.
"Hierarchical computation of interval availability and related metrics." Proceedings of the International Conference on Dependable Systems and Networks (2004): 693-698.
"An infinite server queueing approach for describing software reliability growth ∼ - Unified modeling and estimation framework." Proceedings - Asia-Pacific Software Engineering Conference, APSEC (2004): 110-119.
"A method for modeling and quantifying the security attributes of intrusion tolerant systems." Performance Evaluation 56, no. 1-4 (2004): 167-186.
"Model-based evaluation: From dependability to security." IEEE Transactions on Dependable and Secure Computing 1, no. 1 (2004): 48-64.
"Optimal estimation of training interval for channel equalization." IEEE Transactions on Wireless Communications 3, no. 5 (2004): 1844-1853.
"Security modeling and quantification of intrusion tolerant systems using attack-response graph." Journal of High Speed Networks 13, no. 4 (2004): 297-308.
"Software rejuvenation - modeling and analysis." In IFIP Advances in Information and Communication Technology, 151-182. Vol. 157. 2004.
"Software Rejuvenation - Modeling and Analysis." In IFIP Congress Tutorials, 151-182. Vol. 157. 2004.
"Software rejuvenation policies for cluster systems under varying workload." Proceedings - IEEE Pacific Rim International Symposium on Dependable Computing (2004): 122-129.
"