From post

Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud.

, , , и . UIC/ATC/ScalCom, стр. 50-57. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection., , , и . IEEE Access, (2020)Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security., , , , и . IEEE Access, (2022)Systematic identification of threats in the cloud: A survey., , , , , и . Comput. Networks, (2019)PP-GSM: Privacy-preserving graphical security model for security assessment as a service., , , , и . Future Gener. Comput. Syst., (мая 2023)Composite Metrics for Network Security Analysis., , , и . CoRR, (2020)Dynamic security metrics for measuring the effectiveness of moving target defense techniques., , , , , и . Comput. Secur., (2018)Security Modeling and Analysis of Cross-Protocol IoT Devices., , , и . TrustCom/BigDataSE/ICESS, стр. 1043-1048. IEEE Computer Society, (2017)Towards Automated Generation and Visualization of Hierarchical Attack Representation Models., , и . CIT/IUCC/DASC/PICom, стр. 1689-1696. IEEE, (2015)Comprehensive Security Assessment of Combined MTD Techniques for the Cloud., , , и . MTD@CCS, стр. 11-20. ACM, (2018)Automated security investment analysis of dynamic networks., , , , и . ACSW, стр. 6:1-6:10. ACM, (2018)