Author of the publication

ENSC: Multi-Resource Hybrid Scaling for Elastic Network Service Chain in Clouds.

, , , , and . ICPADS, page 34-41. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A game-theoretic approach to rule sharing mechanism in networked intrusion detection systems: Robustness, incentives and security., , , and . CDC/ECC, page 243-248. IEEE, (2011)Poster: SMURFEN: a rule sharing collaborative intrusion detection network., , , and . ACM Conference on Computer and Communications Security, page 761-764. ACM, (2011)Enhancing Twitter spam accounts discovery using cross-account pattern mining., , and . IM, page 491-496. IEEE, (2015)On Node Population in a Multi-Level 802.15.4 Sensor Network., , and . GLOBECOM, IEEE, (2006)A game-theoretic model for defending against malicious users in RecDroid., and . IM, page 1339-1344. IEEE, (2015)Automated synthesis of NFV topology: A security requirement-oriented design., , and . CNSM, page 1-5. IEEE Computer Society, (2017)Black-box Attacks to Log-based Anomaly Detection., , , , and . CNSM, page 310-316. IEEE, (2022)Transfer Log-based Anomaly Detection with Pseudo Labels., , , , , , and . CNSM, page 1-5. IEEE, (2020)ENSC: Multi-Resource Hybrid Scaling for Elastic Network Service Chain in Clouds., , , , and . ICPADS, page 34-41. IEEE, (2018)Design and management of collaborative intrusion detection networks., and . IM, page 955-961. IEEE, (2013)