Harish Bashettihalli

Learn More
An increasing number of business transactions, mission-critical operations and many other activities rely on the services of computer and network systems, and the dependability of those services. However, many computer and network systems do not currently provide adequate service dependability. Such systems place no admission control on service requests(More)
Existing techniques for cyber attack detection rely mainly on activity data from computers and networks. Little consideration has been given to other kinds of data in the cause-effect chains of attacks. Adding state and performance data may reveal elements on computers and networks that are affected by a cyber attack, thus providing a more accurate,(More)
  • 1