Author of the publication

Trust Validation of Cloud IaaS: A Customer-centric Approach.

, , and . Trustcom/BigDataSE/ISPA, page 97-104. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster: Multi-Layer Threat Analysis of the Cloud., , , and . CCS, page 3419-3421. ACM, (2022)Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments., , , and . IEEE Trans. Cloud Comput., 12 (1): 319-336 (January 2024)Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud., , , and . CCS, page 3415-3417. ACM, (2022)Threat Modeling and Analysis for the Cloud Ecosystem., , and . IC2E, page 278-281. IEEE Computer Society, (2018)Controlling Thin-Film Stress and Wrinkling during Perovskite Film Formation, , , , , , , , , and 2 other author(s). ACS Energy Letters, (May 2018)Monitoring Path Discovery for Supporting Indirect Monitoring of Cloud Services., , and . IC2E, page 274-277. IEEE Computer Society, (2018)AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces., , and . SCC, page 499-502. IEEE Computer Society, (2017)InfoLeak: Scheduling-Based Information Leakage., , , and . PRDC, page 44-53. IEEE, (2018)ThreatPro: Multi-Layer Threat Analysis in the Cloud., , , and . CoRR, (2022)Performance evaluation of evolutionary algorithms for road detection., , , , and . GECCO, page 1331-1332. ACM, (2010)