DeMETER in clouds: detection of malicious external thread execution in runtime with machine learning in PaaS clouds
MT Sandıkkaya, Y Yaslan, CD Özdemir - Cluster Computing, 2020 - Springer
Current state of PaaS allows rapid outsourcing of web applications without noticeable
configuration effort. It could be foreseen that a noteworthy security guarantee in this cloud …
configuration effort. It could be foreseen that a noteworthy security guarantee in this cloud …
Circular Business Models With Resource Sharing and Product-as-a-Service
AK Yadav, P Kanwal, NJ Dewasiri - … , Internationalization, and Green …, 2025 - igi-global.com
This chapter explores the transformative potential of circular business models, focusing on
Resource Sharing and Product-as-a-Service (PaaS). These models represent a shift from …
Resource Sharing and Product-as-a-Service (PaaS). These models represent a shift from …
Application of fsQCA Method in Operations Management Area: Systematic Literature Review
Abstract Fuzzy-set Qualitative Comparative Analysis (fsQCA) is a configurational method
used in fields like business, marketing, and supply chain management. Despite its utility, its …
used in fields like business, marketing, and supply chain management. Despite its utility, its …
Malicious Behavior Classification in PaaS
CD Özdemir, MT Sandıkkaya, Y Yaslan - Cloud Computing and Services …, 2019 - Springer
PaaS delivery model let cloud customers share cloud provider resources through their cloud
applications. This structure requires a strong security mechanism that isolates customer …
applications. This structure requires a strong security mechanism that isolates customer …
Detecting Malicious Behavior in Microservice Based Web Applications
M Özbek, MT Sandıkkaya - 2019 27th Signal Processing and …, 2019 - ieeexplore.ieee.org
Not only the increased complexity of the malicious acts on the Internet, but also the
continuous increase of new attack methods compromise Internet-based services as a threat …
continuous increase of new attack methods compromise Internet-based services as a threat …
[CITAAT][C] Mikroservis tabanlı ağ uygulamalarında zararlı davranışların saptanması
M Özbek - Fen Bilimleri Enstitüsü