Author of the publication

A Workflow for Distributed and Resilient Attack Graph Generation.

, and . DSN-S, page 185-187. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems., , , , and . CoRR, (2018)Investigating the existence and the regularity of Logarithmic Harary Graphs., , , and . Theor. Comput. Sci., 410 (21-23): 2110-2121 (2009)SoK: Achieving State Machine Replication in Blockchains based on Repeated Consensus., , , and . CoRR, (2021)Multi-hop Byzantine Reliable Broadcast Made Practical., , and . CoRR, (2019)PASCAL: An architecture for proactive auto-scaling of distributed services., , , , , and . Future Gener. Comput. Syst., (2019)Practical Byzantine Reliable Broadcast on Partially Connected Networks., , , , and . ICDCS, page 506-516. IEEE, (2021)An Algorithm for Implementing BFT Registers in Distributed Systems with Bounded Churn., , and . SSS, volume 6976 of Lecture Notes in Computer Science, page 32-46. Springer, (2011)Oblivious Assignment with m Slots., , , and . SSS, volume 7596 of Lecture Notes in Computer Science, page 187-201. Springer, (2012)Fighting Erosion in Dynamic Large-Scale Overlay Networks., , , , , and . AINA, page 110-117. IEEE Computer Society, (2007)k-bounded set objects in eventually synchronous distributed systems with churn and continuous accesses., , and . EWDC, page 99-106. ACM, (2011)