Author of the publication

Evaluating the impact of eDoS attacks to cloud facilities.

, , and . EAI Endorsed Trans. Security Safety, 3 (10): e2 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Queueing networks and conditional product-forms., , and . VALUETOOLS, page 204-213. ICST/ACM, (2013)A queueing model with batch arrivals for studying the impact of fragmentation in wireless protocols., , and . Wireless Days, page 1-3. IEEE, (2011)Evaluating the impact of eDoS attacks to cloud facilities., , and . EAI Endorsed Trans. Security Safety, 3 (10): e2 (2016)Exploiting product forms solution techniques in multiformalism modeling., , , , and . PASM/PDMC, volume 296 of Electronic Notes in Theoretical Computer Science, page 61-77. Elsevier, (2012)Performance Analysis and Formal Verification of Cognitive Wireless Networks., , and . EPEW, volume 8168 of Lecture Notes in Computer Science, page 236-250. Springer, (2013)Evaluating resistance to jamming and casual interception in mobile wireless networks., , , and . MSWiM, page 151-158. ACM, (2012)On the solution of cooperating stochastic models.. Ca' Foscari University of Venice, Italy, (2014)Optimisation of Virtual Machine Garbage Collection Policies., , and . ASMTA, volume 6751 of Lecture Notes in Computer Science, page 70-84. Springer, (2011)Modelling Retrial-Upon-Conflict Systems with Product-Form Stochastic Petri Nets., , and . ASMTA, volume 7984 of Lecture Notes in Computer Science, page 52-66. Springer, (2013)Lumping and Reversed Processes in Cooperating Automata., , and . ASMTA, volume 7314 of Lecture Notes in Computer Science, page 212-226. Springer, (2012)