Author of the publication

Building an emulation environment for cyber security analyses of complex networked systems.

, , , , and . ICDCN, page 203-212. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-hop Byzantine Reliable Broadcast Made Practical., , and . CoRR, (2019)Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems., , , , and . CoRR, (2018)Investigating the existence and the regularity of Logarithmic Harary Graphs., , , and . Theor. Comput. Sci., 410 (21-23): 2110-2121 (2009)SoK: Achieving State Machine Replication in Blockchains based on Repeated Consensus., , , and . CoRR, (2021)PASCAL: An architecture for proactive auto-scaling of distributed services., , , , , and . Future Gener. Comput. Syst., (2019)k-bounded set objects in eventually synchronous distributed systems with churn and continuous accesses., , and . EWDC, page 99-106. ACM, (2011)Oblivious Assignment with m Slots., , , and . SSS, volume 7596 of Lecture Notes in Computer Science, page 187-201. Springer, (2012)An Algorithm for Implementing BFT Registers in Distributed Systems with Bounded Churn., , and . SSS, volume 6976 of Lecture Notes in Computer Science, page 32-46. Springer, (2011)On the Efficacy of Smart Contract Analysis Tools., , and . ISSREW, page 37-38. IEEE, (2023)Practical Byzantine Reliable Broadcast on Partially Connected Networks., , , , and . ICDCS, page 506-516. IEEE, (2021)