Author of the publication

Automated pseudo-live testing of firewall configuration enforcement.

, , and . IEEE J. Sel. Areas Commun., 27 (3): 302-314 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards network security policy generation for configuration analysis and testing., , and . SafeConfig, page 45-52. ACM, (2009)Online workflow management and performance analysis with Stampede., , , , , , , , , and 1 other author(s). CNSM, page 1-10. IEEE, (2011)Failure analysis of distributed scientific workflows executing in the cloud., , , , , , and . CNSM, page 46-54. IEEE, (2012)Guest Editorial: Special Issue on Data Analytics and Machine Learning for Network and Service Management - Part II., , , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (1): 775-779 (2021)Observational Data Patterns for Time Series Data Quality Assessment., , , , , , , , , and 1 other author(s). eScience, page 271-278. IEEE Computer Society, (2014)Online Fault and Anomaly Detection for Large-Scale Scientific Workflows., , , , , , , and . HPCC, page 373-381. IEEE, (2011)Failure prediction and localization in large scientific workflows., , , , , , and . WORKS@SC, page 107-116. ACM, (2011)WAN capacity forecasting for large enterprises., and . NOMS, page 1031-1036. IEEE, (2016)A Novel Visualization Approach for Efficient Network-wide Traffic Monitoring., , , and . E2EMON, page 1-7. IEEE Computer Society, (2007)End-to-end verification of QoS policies., and . NOMS, page 426-434. IEEE, (2012)