From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models., , , , , и . IASTED Conf. on Software Engineering, стр. 282-287. IASTED/ACTA Press, (2006)Synergistic verification and validation of systems and software engineering models., , , , и . Int. J. Gen. Syst., 38 (7): 719-746 (2009)Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack., , , , , , и . ESORICS (1), том 9878 из Lecture Notes in Computer Science, стр. 47-66. Springer, (2016)CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters., , , , , , и . CODASPY, стр. 79-90. ACM, (2024)iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 21 (4): 2799-2817 (июля 2024)Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters., , , , , и . ICC, стр. 777-782. IEEE, (2023)ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV)., , , , , и . NDSS, The Internet Society, (2022)A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds., , , , , , , и . CODASPY, стр. 79-90. ACM, (2023)Optimal placement of sequentially ordered virtual security appliances in the cloud., , , , , и . IM, стр. 818-821. IEEE, (2015)Multistage OCDO: Scalable Security Provisioning Optimization in SDN-Based Cloud., , , и . CLOUD, стр. 572-579. IEEE Computer Society, (2015)