Author of the publication

On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis.

, , , and . UCC, page 217-226. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Deep Recurrent Neural Network Based Predictive Control Framework for Reliable Distributed Stream Data Processing., , , , , and . IPDPS, page 262-272. IEEE, (2019)On the use of design diversity in fault tolerant and secure systems: A qualitative analysis., , and . CISDA, page 1-8. IEEE, (2015)Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence., , , , and . CoRR, (2017)Applying chaos theory for runtime Hardware Trojan detection., , , and . CISDA, page 1-6. IEEE, (2015)Reputation Routing in MANETs., , and . VTC Fall, page 1-7. IEEE, (2017)Harnessing the Power of Deception in Attack Graph-Based Security Games., , , , , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 147-167. Springer, (2020)A Network Centrality Game for Epidemic Control., , , , , and . GameSec, volume 13727 of Lecture Notes in Computer Science, page 255-273. Springer, (2022)Partially Observable Stochastic Games for Cyber Deception Against Network Epidemic., , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 312-325. Springer, (2020)Game theoretic attack analysis in online social network (OSN) services., , , and . ASONAM, page 1012-1019. ACM, (2013)Multi-level VM replication based survivability for mission-critical cloud computing., , , and . IM, page 1351-1356. IEEE, (2015)