Author of the publication

An Analytical Model for Estimating Cloud Resources of Elastic Services.

, , and . J. Netw. Syst. Manag., 24 (2): 285-308 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Analysis of MATE Attack in SDN Based on STRIDE Model., , , and . EIDWT, volume 17 of Lecture Notes on Data Engineering and Communications Technologies, page 901-910. Springer, (2018)Towards an efficient verification approach on network configuration., , and . CNSM, page 247-251. IEEE, (2012)Performance Modeling and Analysis of Network Firewalls., , and . IEEE Trans. Netw. Serv. Manag., 9 (1): 12-21 (2012)Throughput and delay analysis of interrupt-driven kernels under Poisson and bursty traffic., and . Comput. Syst. Sci. Eng., (2007)Improving Network Services Configuration Management., and . ICCCN, page 1-6. IEEE, (2011)An Analytical Model for Estimating Cloud Resources of Elastic Services., , and . J. Netw. Syst. Manag., 24 (2): 285-308 (2016)TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay., and . AsiaCCS, page 135-145. ACM, (2009)Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security., , , and . ICNP, page 123-132. IEEE Computer Society, (2009)Information Theoretic Approach for Characterizing Spam Botnets Based on Traffic Properties., , and . ICC, page 1-5. IEEE, (2009)High Level Abstraction Modeling for Network Configuration Validation., and . GLOBECOM, page 1-6. IEEE, (2010)