Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring Firewall Security., and . SafeConfig, IEEE, (2011)Anomaly Discovery and Resolution in MySQL Access Control Policies., , , and . DEXA (2), volume 7447 of Lecture Notes in Computer Science, page 514-522. Springer, (2012)Security-Aware Resource Allocation in Clouds., , and . IEEE SCC, page 400-407. IEEE Computer Society, (2013)CloudChecker: An imperative framework for cloud configuration management., and . SafeConfig, IEEE, (2011)Provable configuration planning for wireless sensor networks., , and . CNSM, page 316-321. IEEE, (2012)A formal approach for virtual machine migration planning., and . CNSM, page 51-58. IEEE Computer Society, (2013)Objective metrics for firewall security: A holistic view., , and . CNS, page 470-477. IEEE, (2013)Build and Test Your Own Network Configuration., , and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 522-532. Springer, (2011)SensorChecker: reachability verification in mission-oriented sensor networks., , , and . MiSeNet@MobiCom, page 51-56. ACM, (2013)FlowChecker: configuration analysis and verification of federated openflow infrastructures., and . SafeConfig, page 37-44. ACM, (2010)