Author of the publication

Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing.

, , , , and . CLOSER, page 145-148. SciTePress, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Era for Management to Deal with Scalability, Invisibility and Shared Responsibility.. SAINT, page 352. IEEE Computer Society, (2011)A Proposal for Anomaly Traffic Detection in the IP Multimedia Subsystem Using Tanimoto Distance and a Modified Moving Average., , and . SAINT, page 278-283. IEEE Computer Society, (2012)A Fast Polling I/O Implementation with Real-time Signals., , and . NCA, page 317-322. IEEE Computer Society, (2004)Design of Geographically Aggregatable Address and Routing Toward Location Based Multicast., , and . AINA Workshops, page 1307-1312. IEEE Computer Society, (2013)Performance comparison of layer 3 switches in cases of flow- and topology-driven connection setup., , , and . J. Commun. Networks, 2 (2): 118-126 (2000)Proactive AP Selection Method Considering the Radio Interference Environment., , , , and . IEICE Trans. Inf. Syst., 92-D (10): 1867-1876 (2009)Client Honeypot Multiplication with High Performance and Precise Detection., , , , and . IEICE Trans. Inf. Syst., 98-D (4): 775-787 (2015)A framework of a content distribution service synchronized with tv broadcasting programs., , , and . CCNC, page 1063-1067. IEEE, (2006)Wireless Measurement Framework to Survey an Area with Required Communication Quality., , , and . AINA Workshops, page 439-446. IEEE Computer Society, (2009)Conceptualizing Player-Side Emergence in Interactive Games: Between Hardcoded Software and the Human Mind in Papers, Please and Gone Home., , and . Int. J. Gaming Comput. Mediat. Simulations, 7 (3): 1-21 (2015)