Nayot Poolsappasit, Ph.D.
Affiliations: | 2010 | Computer Science | Colorado State University, Fort Collins, CO |
Area:
Computer ScienceGoogle:
"Nayot Poolsappasit"Parents
Sign in to add mentorIndrakshi Ray | grad student | 2010 | Colorado State | |
(Towards an efficient vulnerability analysis methodology for better security risk management.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Bhonsle MV, Poolsappasit N, Madria SK. (2013) ETIS - Efficient trust and identity management system for federated service providers Proceedings - International Conference On Advanced Information Networking and Applications, Aina. 219-226 |
Poolsappasit N, Dewri R, Ray I. (2012) Dynamic security risk management using Bayesian attack graphs Ieee Transactions On Dependable and Secure Computing. 9: 61-74 |
Dewri R, Ray I, Poolsappasit N, et al. (2012) Optimal security hardening on attack tree models of networks: A cost-benefit analysis International Journal of Information Security. 11: 167-188 |
Poolsappasit N, Kumar V, Madria S, et al. (2011) Challenges in secure sensor-cloud computing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6933: 70-84 |
Poolsappasit N, Ray I. (2009) Towardsachieving personalized privacy for location-based services Transactions On Data Privacy. 2: 77-99 |
Ray I, Poolsappasit N. (2008) Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents International Journal of Security and Networks. 3: 80-94 |
Poolsappasit N, Ray I. (2008) Towards a scalable model for location privacy Proceedings of the Sigspatial Acm Gis 2008 International Workshop On Security and Privacy in Gis and Lbs, Springl'08. 46-51 |
Dewri R, Poolsappasit N, Ray I, et al. (2007) Optimal security hardening using multi-objective optimization on attack tree models of networks Proceedings of the Acm Conference On Computer and Communications Security. 204-213 |
Poolsappasit N, Ray I. (2007) Enhancing internet domain name system availability by building rings of cooperation among cache resolvers Proceedings of the 2007 Ieee Workshop On Information Assurance, Iaw. 317-324 |