Author of the publication

AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces.

, , and . SCC, page 499-502. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster: Multi-Layer Threat Analysis of the Cloud., , , and . CCS, page 3419-3421. ACM, (2022)InfoLeak: Scheduling-Based Information Leakage., , , and . PRDC, page 44-53. IEEE, (2018)Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud., , , and . CCS, page 3415-3417. ACM, (2022)Threat Modeling and Analysis for the Cloud Ecosystem., , and . IC2E, page 278-281. IEEE Computer Society, (2018)Controlling Thin-Film Stress and Wrinkling during Perovskite Film Formation, , , , , , , , , and 2 other author(s). ACS Energy Letters, (May 2018)Monitoring Path Discovery for Supporting Indirect Monitoring of Cloud Services., , and . IC2E, page 274-277. IEEE Computer Society, (2018)AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces., , and . SCC, page 499-502. IEEE Computer Society, (2017)ThreatPro: Multi-Layer Threat Analysis in the Cloud., , , and . CoRR, (2022)Performance evaluation of evolutionary algorithms for road detection., , , , and . GECCO, page 1331-1332. ACM, (2010)Threat Modeling the Cloud: An Ontology Based Approach., , , and . IOSec@RAID, volume 11398 of Lecture Notes in Computer Science, page 61-72. Springer, (2018)