Author of the publication

Attack Pattern Recognition Through Correlating Cyber Situational Awareness in Computer Networks.

, , and . Cyberpatterns, Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Distributed, Self-organising Approach to Malware Detection in Cloud Computing., , , , and . IWSOS, volume 8221 of Lecture Notes in Computer Science, page 182-185. Springer, (2013)Attack Pattern Recognition Through Correlating Cyber Situational Awareness in Computer Networks., , and . Cyberpatterns, Springer, (2014)Assessing the impact of intra-cloud live migration on anomaly detection., , , , , and . CloudNet, page 52-57. IEEE, (2014)A framework for resilience management in the cloud., , , , and . Elektrotech. Informationstechnik, 132 (2): 122-132 (2015)Malware Detection in Cloud Computing Infrastructures., , , , and . IEEE Trans. Dependable Secur. Comput., 13 (2): 192-205 (2016)Malware analysis in cloud computing: Network and system characteristics., , , , and . GLOBECOM Workshops, page 482-487. IEEE, (2013)Anomaly detection for resilience in cloud computing infrastructures.. Lancaster University, UK, (2017)British Library, EThOS.A Multi-commodity Network Flow Model for Cloud Service Environments., , , and . EANN, volume 629 of Communications in Computer and Information Science, page 186-197. Springer, (2016)Evading Virus Detection Using Code Obfuscation., , , and . FGIT, volume 6485 of Lecture Notes in Computer Science, page 394-401. Springer, (2010)MPLS Unleashed: Remedy Using IPSEC over MPLS VPN., , , and . ISA, volume 76 of Communications in Computer and Information Science, page 241-248. Springer, (2010)