Author of the publication

Model-based evaluation of the power versus performance of network routing algorithms.

, , and . Computing, 103 (8): 1723-1746 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Taxonomy of Frauds and Fraud Detection Techniques., and . ICISTM, volume 31 of Communications in Computer and Information Science, page 256-267. Springer, (2009)A distributed multi-approach intrusion detection system for web services., and . SIN, page 238-244. ACM, (2010)A method for evaluating the consequence propagation of security attacks in cyber-physical systems., and . Future Gener. Comput. Syst., (2017)A method for intrusion detection in web services based on time series., , and . CCECE, page 836-841. IEEE, (2015)A Computational Trust Model for E-Commerce Systems., and . DigiBiz, volume 21 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 9-18. Springer, (2009)Efficient Evaluation of CSAN Models by State Space Analysis Methods., and . ICSEA, page 57. IEEE Computer Society, (2006)Towards a Trust-Based Model for Administration of Mailing Lists., and . GLOBECOM, page 5558-5563. IEEE, (2008)Unified power and performance analysis of cloud computing infrastructure using stochastic reward nets., , and . Comput. Commun., (2019)PDETool: A Multi-formalism Modeling Tool for Discrete-Event Systems Based on SDES Description., , and . Petri Nets, volume 5606 of Lecture Notes in Computer Science, page 343-352. Springer, (2009)A high-performance and scalable multi-core aware software solution for network monitoring., and . J. Supercomput., 59 (2): 720-743 (2012)