From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Taxonomy Model for Cloud Computing Services., , , , , , и . CLOSER, стр. 56-65. SciTePress, (2011)Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology., , , и . DBSec, том 10980 из Lecture Notes in Computer Science, стр. 312-329. Springer, (2018)Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack., , , , , и . CODASPY, стр. 195-206. ACM, (2016)ProSAS: Proactive Security Auditing System for Clouds., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (4): 2517-2534 (2022)Studying Impacts of Prefix Interception Attack by Exploring BGP AS-PATH Prepending., и . ICDCS, стр. 667-677. IEEE Computer Society, (2012)A New Architecture for Secure Carrier-Class Clusters., , , , и . CLUSTER, стр. 494-498. IEEE Computer Society, (2002)VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack., , , , и . NordSec, том 13700 из Lecture Notes in Computer Science, стр. 346-367. Springer, (2022)Learning probabilistic dependencies among events for proactive security auditing in clouds., , , , , , , и . J. Comput. Secur., 27 (2): 165-202 (2019)A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization., , , , , , и . ACM Trans. Priv. Secur., 24 (3): 14:1-14:36 (2021)Communication security for smart grid distribution networks., , , , и . IEEE Commun. Mag., 51 (1): 42-49 (2013)