Author of the publication

Analysis of Hypoexponential Computing Services for Big Data Processing.

, , and . FiCloud, page 579-584. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ISO/IEC Competence Requirements for Information Security Professionals., and . World Conference on Information Security Education, volume 503 of IFIP Advances in Information and Communication Technology, page 135-146. Springer, (2017)Big Data, Fast Data and Data Lake Concepts., and . BICA, volume 88 of Procedia Computer Science, page 300-305. Elsevier, (2016)Analysis of Intrusion Detection and Prevention Systems as Queueing Services., , and . AINA Workshops, page 855-860. IEEE Computer Society, (2016)"Network Security Intelligence" Educational and Research Center., , and . World Conference on Information Security Education, volume 503 of IFIP Advances in Information and Communication Technology, page 157-168. Springer, (2017)Big Data Information Security Maintenance., , , and . SIN, page 89. ACM, (2014)How to Overcome Staff Shortage in Professionals for SOCs and NSICs., and . World Conference on Information Security Education, volume 650 of IFIP Advances in Information and Communication Technology, page 31-45. Springer, (2022)Analysis of Hypoexponential Computing Services for Big Data Processing., , and . FiCloud, page 579-584. IEEE Computer Society, (2015)Modeling of next-generation firewalls as queueing services., , and . SIN, page 250-257. ACM, (2015)Developing Hands-On Laboratory Works for the "Information Security Incident Management" Discipline., and . World Conference on Information Security Education, volume 531 of IFIP Advances in Information and Communication Technology, page 28-39. Springer, (2018)Blockchain and Its Security: Ignore or Insert into Academic Training?, and . World Conference on Information Security Education, volume 557 of IFIP Advances in Information and Communication Technology, page 102-113. Springer, (2019)