Bharat B. Madan

Learn More
Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be accidental. Instead some failures may be caused by deliberate security intrusions with the intent ranging from simple mischief, theft of confidential information to loss of crucial and possibly life saving services. Not only it is(More)
Quite often failures in network based services and server systems may not be accidental, but rather caused by deliberate security intrusions. We would like such systems to either completely preclude the possibility of a security intrusion or design them to be robust enough to continue functioning despite security attacks. Not only is it important to prevent(More)
Software coding practices, in the interest of efficiency, often ignore to enforce strict bound checking on buffers, arrays and pointers. This results in software code that is more vulnerable to security intrusions exploiting buffer overflow vulnerabilities. Unfortunately, such attacks form the most common type of security threats to the computer and(More)
For cellular communication systems, mobility and limited radio coverage of a cell require calls to be handed over from one base station system (BSS) to an another BSS. Due to the limited bandwidth available in various cells, there is a finite probability that an ongoing call while being handed off may get dropped. Minimizing the dropping of ongoing calls(More)
BGP directs user traffic to its destination along routes sourced from originating ASs. Originating ASs are generally large, independently administrated networks, such as Internet Service Providers, that state to have direct access to a set of IP networks. An IP network and its origin AS are married through configuration of the origin AS’s BGP routers, but(More)
The security breaches are responsible for not only financial loss but affect the trustworthiness and integrity of the software design and development industry. The breaches are directly affecting the security attributes like Privacy, Availability, Confidentiality, Authorization, Authentication, and Integrity. The aim of security at design level is to(More)
An attempt to alter protein surface charges through traditional protein engineering approaches often affects the native protein structure significantly and induces misfolding. This limitation is a major hindrance in modulating protein properties through surface charge variations. In this study, as a strategy to overcome such a limitation, we attempted to(More)
Distributed sensing has heen used for enhancing signal to noise ratios for space-time localization and tracking of remote objects using phased array antennas, sonar, and radio signals. The use of these technologies in identifying mobile targets in a field, emitting acoustic signals, using a network of low-cost narrow band acoustic micro-sensing devices(More)
In this paper, we describe three different state space models for analyzing the security of a software system. In the first part of this paper, we utilize a semi-Markov process (SMP) to model the transitions between the security states of an abstract software system. The SMP model can be solved to obtain the probability of reaching security failed states(More)