2018 - ACM Senior Member
His main research concerns Computer security, Durability, Fibre-reinforced plastic, Composite material and Web of trust. His Computer security research is multidisciplinary, incorporating elements of E-commerce, Multi-objective optimization and The Internet. His E-commerce research is multidisciplinary, relying on both Trusted third party, Protocol and Internet privacy.
His study looks at the relationship between Multi-objective optimization and topics such as Risk assessment, which overlap with Risk analysis. Indrajit Ray interconnects Ultimate tensile strength, Structural engineering and Glass fiber in the investigation of issues within Durability. His Vulnerability research is multidisciplinary, incorporating perspectives in Misuse detection and Vulnerability.
Indrajit Ray spends much of his time researching Computer security, Mathematical economics, Composite material, Nash equilibrium and Correlated equilibrium. His specific area of interest is Computer security, where Indrajit Ray studies Access control. His work in Composite material is not limited to one particular discipline; it also encompasses Structural engineering.
His biological study deals with issues like Personally identifiable information, which deal with fields such as Information privacy. Indrajit Ray works mostly in the field of Security information and event management, limiting it down to topics relating to Security service and, in certain cases, Security through obscurity. In general Fly ash, his work in Silica fume is often linked to Slag linking many areas of study.
His primary areas of study are Computer security, Mathematical economics, Encryption, Nash equilibrium and Digital signature. His Computer security research includes elements of Graph and Set. His Encryption research integrates issues from Nearest neighbor search, Information retrieval and Cryptography.
Indrajit Ray has researched Cryptography in several fields, including Authentication protocol and Embedded system. His research integrates issues of Correlated equilibrium, Public bad, Public good and Correlation in his study of Nash equilibrium. As a part of the same scientific family, Indrajit Ray mostly works in the field of Digital signature, focusing on Identity and, on occasion, Synthetic biology, Attribution and Communication.
Indrajit Ray mainly focuses on Computer security, Encryption, Cryptography, Access control and Identification. His research in Computer security intersects with topics in CVSS and Graph. His Encryption study combines topics from a wide range of disciplines, such as Overhead and Synthetic biology.
His Cryptography research includes themes of Trusted third party, Probabilistic logic and Information leakage. His work on Attribute-based access control and Role-based access control as part of general Access control study is frequently connected to OpenID Connect, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. His Identification study integrates concerns from other disciplines, such as Key management, Cryptographic protocol, Authentication protocol, Authentication and Embedded system.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Dynamic Security Risk Management Using Bayesian Attack Graphs
N. Poolsappasit;R. Dewri;I. Ray.
IEEE Transactions on Dependable and Secure Computing (2012)
Accelerated aging tests for evaluations of durability performance of FRP reinforcing bars for concrete structures
Yi Chen;Julio F. Davalos;Indrajit Ray;Hyeong-Yeol Kim.
Composite Structures (2007)
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
Sudip Chakraborty;Indrajit Ray.
symposium on access control models and technologies (2006)
Measuring, analyzing and predicting security vulnerabilities in software systems
O. H. Alhazmi;Y. K. Malaiya;I. Ray.
Computers & Security (2007)
Optimal security hardening using multi-objective optimization on attack tree models of networks
Rinku Dewri;Nayot Poolsappasit;Indrajit Ray;Darrell Whitley.
computer and communications security (2007)
Durability Prediction for GFRP Reinforcing Bars using Short-Term Data of Accelerated Aging Tests
Yi Chen;Julio F. Davalos;Indrajit Ray.
Journal of Composites for Construction (2006)
Using attack trees to identify malicious attacks from authorized insiders
Indrajit Ray;Nayot Poolsapassit.
european symposium on research in computer security (2005)
Effect of FRP bar degradation on interface bond with high strength concrete
Julio F. Davalos;Yi Chen;Indrajit Ray.
Cement & Concrete Composites (2008)
The Psychology of Security for the Home Computer User
A. E. Howe;I. Ray;M. Roberts;M. Urbanska.
ieee symposium on security and privacy (2012)
Long-term durability prediction models for GFRP bars in concrete environment
Julio F Davalos;Yi Chen;Indrajit Ray.
Journal of Composite Materials (2012)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: