Towards cost-sensitive assessment of intrusion response selection PublicationN. Stakhanova, Strasburg, C., Basu, S., and Wong, J. S., “Towards cost-sensitive assessment of intrusion response selection”, Journal of computer security, vol. 20, no. 2, pp. 169-198, 2012. Google ScholarXML
FocusCheck: A tool for model checking and debugging sequential C programs PublicationC. W. Keller, Saha, D., Basu, S., and Smolka, S. A., “FocusCheck: A tool for model checking and debugging sequential C programs”, in Tools and Algorithms for the Construction and Analysis of Systems, Springer Berlin Heidelberg, 2005, pp. 563-569. Google ScholarXML
Local module checking for CTL specifications PublicationS. Basu, Roop, P. S., and Sinha, R., “Local module checking for CTL specifications”, Electronic Notes in Theoretical Computer Science, vol. 176, no. 2, pp. 125-141, 2007. Google ScholarXML
Quotient-based control synthesis for partially observed non-deterministic plants with mu-calculus specifications PublicationS. Basu and Kumar, R., “Quotient-based control synthesis for partially observed non-deterministic plants with mu-calculus specifications”, Decision and Control, 2007 46th IEEE Conference on. IEEE, pp. 5294-5299, 2007. Google ScholarXML
Behavioral automata composition for automatic topology independent verification of parameterized systems PublicationY. Hanna, Basu, S., and Rajan, H., “Behavioral automata composition for automatic topology independent verification of parameterized systems”, Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering. ACM, pp. 325-334, 2009. Google ScholarXML
Generation of all counter-examples for push-down systems PublicationS. Basu, Saha, D., Lin, Y. - J., and Smolka, S. A., “Generation of all counter-examples for push-down systems”, in Formal Techniques for Networked and Distributed Systems-FORTE 2003, Springer Berlin Heidelberg, 2003, pp. 79-94. Google ScholarXML
Proxi-annotated control flow graphs: Deterministic context-sensitive monitoring for intrusion detection PublicationS. Basu and Uppuluri, P., “Proxi-annotated control flow graphs: Deterministic context-sensitive monitoring for intrusion detection”, Distributed Computing and Internet Technology, pp. 353-362, 2005. Google ScholarXML
Parameterized verification of π-calculus systems PublicationP. Yang, Basu, S., and Ramakrishnan, C. R., “Parameterized verification of π-calculus systems”, in Tools and Algorithms for the Construction and Analysis of Systems, Springer Berlin Heidelberg, 2006, pp. 42-57. Google ScholarXML
The methodology for evaluating response cost for intrusion response systems PublicationC. Roy Strasburg, Stakhanova, N., Basu, S., and Wong, J. S., “The methodology for evaluating response cost for intrusion response systems”, 2008. Google ScholarXML
Identifying optimal composite services by decomposing the service composition problem PublicationZ. J. Oster, Santhanam, G. Ram, and Basu, S., “Identifying optimal composite services by decomposing the service composition problem”, Web Services (ICWS), 2011 IEEE International Conference on. IEEE, pp. 267-274, 2011. Google ScholarXML