Author of the publication

Selectivity and Autoscaling as Complementary Defenses for DDoS Protection to Cloud Services.

, , , , , and . CloudNet, page 1-3. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compound noise analysis in digital circuits using blind source separation., , and . ISCAS, IEEE, (2006)On the Formalization and Computational Complexity of Resilience Problems for Cyber-Physical Systems., , , , , and . ICTAC, volume 13572 of Lecture Notes in Computer Science, page 96-113. Springer, (2022)On the Complexity of Verification of Time-Sensitive Distributed Systems., , , , and . Protocols, Strands, and Logic, volume 13066 of Lecture Notes in Computer Science, page 251-275. Springer, (2021)Symbolic Timed Trace Equivalence., , and . Foundations of Security, Protocols, and Equational Reasoning, volume 11565 of Lecture Notes in Computer Science, page 89-111. Springer, (2019)On the Complexity of Verification of Time-Sensitive Distributed Systems: Technical Report., , , , and . CoRR, (2021)Resource-Bounded Intruders in Denial of Service Attacks., , , , , , and . CSF, page 382-396. IEEE, (2019)Selectivity and Autoscaling as Complementary Defenses for DDoS Protection to Cloud Services., , , , , and . CloudNet, page 1-3. IEEE, (2019)Statistical Model Checking of Distance Fraud Attacks on the Hancke-Kuhn Family of Protocols., , , , , and . CPS-SPC@CCS, page 60-71. ACM, (2018)Abstract Effects and Proof-Relevant Logical Relations, , and . CoRR, (2012)Model-Based Safety and Security Engineering., , and . CoRR, (2018)