Author of the publication

Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud.

, , , and . UIC/ATC/ScalCom, page 50-57. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Modeling and Analysis of Cross-Protocol IoT Devices., , , and . TrustCom/BigDataSE/ICESS, page 1043-1048. IEEE Computer Society, (2017)Automated security investment analysis of dynamic networks., , , , and . ACSW, page 6:1-6:10. ACM, (2018)Systematic identification of threats in the cloud: A survey., , , , , and . Comput. Networks, (2019)Dynamic security metrics for measuring the effectiveness of moving target defense techniques., , , , , and . Comput. Secur., (2018)Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection., , , and . IEEE Access, (2020)Composite Metrics for Network Security Analysis., , , and . CoRR, (2020)Towards Automated Generation and Visualization of Hierarchical Attack Representation Models., , and . CIT/IUCC/DASC/PICom, page 1689-1696. IEEE, (2015)Comprehensive Security Assessment of Combined MTD Techniques for the Cloud., , , and . MTD@CCS, page 11-20. ACM, (2018)Scalable security analysis in hierarchical attack representation model using centrality measures., and . DSN Workshops, page 1-8. IEEE Computer Society, (2013)A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking., , , , and . IEEE Access, (2019)