Ravi Jhawar

According to our database1, Ravi Jhawar authored at least 15 papers between 2011 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree Library.
Proceedings of the Security and Trust Management - 14th International Workshop, 2018

2017
Refinement-Aware Generation of Attack Trees.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

2016
A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.
Proceedings of the Quantitative Evaluation of Systems - 13th International Conference, 2016

2015
Dependability-Oriented Resource Management Schemes for Cloud Computing Data Centers.
Proceedings of the Handbook on Data Centers, 2015

Attack Trees with Sequential Conjunction.
CoRR, 2015

Dependability certification of services: a model-based approach.
Computing, 2015

Attack Trees with Sequential Conjunction.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2014
Securing Mission-Centric Operations in the Cloud.
Proceedings of the Secure Cloud Computing, 2014

2013
Fault Tolerance Management in Cloud Computing: A System-Level Perspective.
IEEE Systems Journal, 2013

Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing.
Proceedings of the SECRYPT 2013, 2013

Reliable mission deployment in vulnerable distributed systems.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
A model-based approach to reliability certification of services.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

Supporting Security Requirements for Resource Management in Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

2011
Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication.
Proceedings of the 5th International Conference on Network and System Security, 2011


  Loading...