Author of the publication

Quantitative survivability evaluation of three virtual machine-based server architectures.

, , , , , , and . J. Network and Computer Applications, 36 (2): 781-790 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Zang, Wanyu
add a person with the name Zang, Wanyu
 

Other publications of authors with the same name

JAPS-II: A Source to Source Parallelizing Compiler for Java., , , , and . PDPTA, page 164-170. CSREA Press, (2002)A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes., and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 289-302. Springer, (2006)Quantitative survivability evaluation of three virtual machine-based server architectures., , , , , , and . J. Network and Computer Applications, 36 (2): 781-790 (2013)Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures., , , and . SECRYPT, page 478-485. SciTePress, (2010)Intrusion Masking for Distributed Atomic Operations., , and . SEC, volume 250 of IFIP Conference Proceedings, page 229-240. Kluwer, (2003)Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks., , , and . ICC, page 1-6. IEEE, (2011)Risk balance defense approach against intrusions for network server., , , and . Int. J. Inf. Sec., 13 (3): 255-269 (2014)Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling., , , , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 491-511. Springer, (2018)Approximate Self-Adaptive Data Collection in Wireless Sensor Networks., , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 564-575. Springer, (2014)Incentive-based modeling and inference of attacker intent, objectives, and strategies., , and . ACM Trans. Inf. Syst. Secur., 8 (1): 78-118 (2005)