Author of the publication

Attack Tolerance for Services-Based Applications in the Cloud.

, , and . ICTSS, volume 11812 of Lecture Notes in Computer Science, page 242-258. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special issue on formal active and passive testing of distributed and networked systems., , and . Ann. des Télécommunications, 70 (3-4): 83-84 (2015)Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection., , , , and . ICWS, volume 10966 of Lecture Notes in Computer Science, page 472-486. Springer, (2018)A GSM-MAP Protocol Experiment Using Passive Testing., , and . World Congress on Formal Methods, volume 1708 of Lecture Notes in Computer Science, page 915-934. Springer, (1999)Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System., and . SEKE, page 393-396. Knowledge Systems Institute Graduate School, (2014)HTTP/2 Attacks Generation using 5Greplay., , , , and . ARES, page 138:1-138:7. ACM, (2023)SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks., , , , , , , , , and 5 other author(s). ARES, page 108:1-108:10. ACM, (2021)An Analysis of Secure M2M Communication in WSNs Using DTLS., , and . ICDCS Workshops, page 78-83. IEEE Computer Society, (2016)TestNet: Let's Test Together!., , and . TestCom, volume 2644 of Lecture Notes in Computer Science, page 258-264. Springer, (2003)A Study of Threat Detection Systems and Techniques in the Cloud., , and . CRiSIS, volume 10694 of Lecture Notes in Computer Science, page 140-155. Springer, (2017)Smart Measurements and Analysis for Software Quality Enhancement., , , and . ICSOFT (Selected Papers), volume 1077 of Communications in Computer and Information Science, page 194-219. Springer, (2018)