Author of the publication

SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats.

, , , , and . Trustcom/BigDataSE/ISPA, page 465-472. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-service Privacy: User-Centric Privacy for Network-Centric Identity., , , , , and . IFIPTM, volume 321 of IFIP Advances in Information and Communication Technology, page 17-31. Springer, (2010)AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security., , , and . TrustCom, page 284-291. IEEE Computer Society, (2014)Blended Identity: Pervasive IdM for Continuous Authentication., , , , and . IEEE Security & Privacy, 13 (3): 32-39 (2015)Identifying and Utilizing Dependencies Across Cloud Security Services., , , , and . AsiaCCS, page 329-340. ACM, (2016)Threat Modeling the Cloud: An Ontology Based Approach., , , and . IOSec@RAID, volume 11398 of Lecture Notes in Computer Science, page 61-72. Springer, (2018)Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level., , , and . IOSec@RAID, volume 11398 of Lecture Notes in Computer Science, page 27-38. Springer, (2018)Security Management Architecture for NFV/SDN-Aware IoT Systems., , , , , , , , and . IEEE Internet of Things Journal, 6 (5): 8005-8020 (2019)SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats., , , , and . Trustcom/BigDataSE/ISPA, page 465-472. IEEE, (2016)deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services., , , and . SCC, page 27-34. IEEE Computer Society, (2017)Quantifiably Trusting the Cloud: Putting Metrics to Work., , and . IEEE Security & Privacy, 14 (3): 73-77 (2016)