Harish Bashettihalli

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Existing techniques for cyber attack detection rely mainly on activity data from computers and networks. Little consideration has been given to other kinds of data in the cause-effect chains of attacks. Adding state and performance data may reveal elements on computers and networks that are affected by a cyber attack, thus providing a more accurate,(More)
An increasing number of business transactions, mission-critical operations and many other activities rely on the services of computer and network systems, and the dependability of those services. However, many computer and network systems do not currently provide adequate service dependability. Such systems place no admission control on service requests(More)
  • 1