Threat modeling and analysis for the cloud ecosystem S Manzoor, H Zhang, N Suri 2018 IEEE International Conference on Cloud Engineering (IC2E), 278-281, 2018 | 15 | 2018 |
C'mon: Monitoring the compliance of cloud services to contracted properties S Alboghdady, S Winter, A Taha, H Zhang, N Suri Proceedings of the 12th International Conference on Availability …, 2017 | 15 | 2017 |
Sentry: A novel approach for mitigating application layer DDoS threats H Zhang, A Taha, R Trapero, J Luna, N Suri 2016 IEEE Trustcom/BigDataSE/ISPA, 465-472, 2016 | 10 | 2016 |
deQAM: A dependency based indirect monitoring approach for cloud services H Zhang, R Trapero, J Luna, N Suri 2017 IEEE International Conference on Services Computing (SCC), 27-34, 2017 | 7 | 2017 |
Technical implementation and feasibility GL Mikkelsen, K Damgård, H Guldager, JL Jensen, JG Luna, JD Nielsen, ... Attribute-based Credentials for Trust: Identity in the Information Society …, 2015 | 3 | 2015 |
Flashlight: a novel monitoring path identification schema for securing cloud services H Zhang, J Luna, N Suri, R Trapero Proceedings of the 13th International Conference on Availability …, 2018 | 2 | 2018 |
Monitoring path discovery for supporting indirect monitoring of cloud services H Zhang, S Manzoor, N Suri 2018 IEEE International Conference on Cloud Engineering (IC2E), 274-277, 2018 | 2 | 2018 |
Whetstone: Reliable Monitoring of Cloud Services H Zhang, J Luna, R Trapero, N Suri 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 115-122, 2018 | 1 | 2018 |
D4. 3 Final Perturbation Analysis of the Implementation J Luna, N Suri, G Pellegrino, H Zhang, M Bladt | | 2014 |
Message from the IC2E 2018 Doctoral Symposium Chair H Zhang, S Manzoor, N Suri | | |