Author of the publication

Selectivity and Autoscaling as Complementary Defenses for DDoS Protection to Cloud Services.

, , , , , and . CloudNet, page 1-3. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Selective Defense for Application Layer DDoS Attacks., , and . JISIC, page 75-82. IEEE, (2014)Abstract Effects and Proof-Relevant Logical Relations, , and . CoRR, (2012)Model-Based Safety and Security Engineering., , and . CoRR, (2018)Compound noise analysis in digital circuits using blind source separation., , and . ISCAS, IEEE, (2006)On the Complexity of Verification of Time-Sensitive Distributed Systems: Technical Report., , , , and . CoRR, (2021)On the Formalization and Computational Complexity of Resilience Problems for Cyber-Physical Systems., , , , , and . ICTAC, volume 13572 of Lecture Notes in Computer Science, page 96-113. Springer, (2022)On the Complexity of Verification of Time-Sensitive Distributed Systems., , , , and . Protocols, Strands, and Logic, volume 13066 of Lecture Notes in Computer Science, page 251-275. Springer, (2021)Symbolic Timed Trace Equivalence., , and . Foundations of Security, Protocols, and Equational Reasoning, volume 11565 of Lecture Notes in Computer Science, page 89-111. Springer, (2019)Automated Construction of Security Integrity Wrappers for Industry 4.0 Applications., and . WRLA@ETAPS, volume 12328 of Lecture Notes in Computer Science, page 197-215. Springer, (2020)Adding Knowledge Updates to 3APL., and . PROMAS, volume 4411 of Lecture Notes in Computer Science, page 165-181. Springer, (2006)