Author of the publication

Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach.

, , , , , , and . ICDCS Workshops, page 61-66. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GEIGER: Solution for small businesses to protect themselves against cyber-threats., , , and . ARES, page 157:1-157:4. ACM, (2021)Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions., , , , and . CNSM, page 1-9. IEEE, (2019)Dynamic Deployment and Monitoring of Security Policies., , , , and . TrustBus, volume 9264 of Lecture Notes in Computer Science, page 180-192. Springer, (2015)The Forth International Workshop on Security Testing (SECTEST 2013)., and . ICST Workshops, page 433-434. IEEE Computer Society, (2013)Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking., , and . ADHOC-NOW, volume 5198 of Lecture Notes in Computer Science, page 345-356. Springer, (2008)Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks., , , , , and . Comput. Networks, (December 2023)The Role of Machine Learning in Cybersecurity., , , , , , and . CoRR, (2022)The DYNABIC approach to resilience of critical infrastructures., , , , , , , , , and 2 other author(s). ARES, page 136:1-136:8. ACM, (2023)5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection., , , , and . ARES, page 106:1-106:8. ACM, (2021)Metrics-driven DevSecOps., , , and . ICSOFT, page 228-233. ScitePress, (2020)