Author of the publication

A methodology for automated penetration testing of cloud applications.

, , , and . Int. J. Grid Util. Comput., 11 (2): 267-277 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity federation in cloud computing., , and . IAS, page 253-259. IEEE, (2010)A clock synchronization algorithm for the performance analysis of multicomputer systems., and . Concurr. Pract. Exp., 6 (8): 653-671 (1994)Per-service security SLAs for cloud security management: model and implementation., , , , and . Int. J. Grid Util. Comput., 9 (2): 128-138 (2018)Simulation-based optimization of multiple-task GRID applications., , , and . Future Gener. Comput. Syst., 24 (6): 594-604 (2008)A grid-aware MIP solver: Implementation and case studies., , , and . Future Gener. Comput. Syst., 24 (2): 133-141 (2008)An SLA-based brokering platform to provide sensor networks as-a-service., , , , and . Int. J. Bus. Process. Integr. Manag., 7 (2): 114-127 (2014)AutoLog: Anomaly detection by deep autoencoding of system logs., , and . Expert Syst. Appl., (2022)Toward the automation of threat modeling and risk assessment in IoT systems., , , and . Internet Things, (2019)Black-box load testing to support auto-scaling web applications in the cloud., , , and . Int. J. Grid Util. Comput., 12 (2): 139-148 (2021)A methodology for automated penetration testing of cloud applications., , , and . Int. J. Grid Util. Comput., 11 (2): 267-277 (2020)