Waseem Mandarawi
Waseem Mandarawi
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Classifying malware attacks in IaaS cloud environments
N Rakotondravony, B Taubmann, W Mandarawi, E Weishäupl, P Xu, ...
Journal of Cloud Computing 6 (1), 1-12, 2017
Monitoring and autoscaling IaaS clouds: a case for complex event processing on data streams
O Saleh, F Gropengießer, H Betz, W Mandarawi, KU Sattler
2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing …, 2013
CloudIDEA: a malware defense architecture for cloud data centers
A Fischer, T Kittel, B Kolosnjaji, TK Lengyel, W Mandarawi, H Meer, ...
OTM Confederated International Conferences" On the Move to Meaningful …, 2015
Modeling security requirements for VNE algorithms
A Fischer, R Kühn, W Mandarawi, H de Meer
proceedings of the 10th EAI International Conference on Performance …, 2017
Constraint-based virtualization of industrial networks
W Mandarawi, A Fischer, AM Houyou, HP Huth, H Meer
Principles of Performance and Reliability Modeling and Evaluation, 567-586, 2016
CloudIDEA: Cloud Intrusion Detection, Evidence preservation and Analysis
B Taubmann, HP Reiser, T Kittel, A Fischer, W Mandarawi, H De Meer
EuroSys poster, 2015
A Framework for Virtualizing Time-aware Shaper Using High Performance NFV
W Mandarawi, H Chahed, H de Meer
2020 25th IEEE International Conference on Emerging Technologies and Factory …, 2020
Policy-Based Composition and Embedding of Extended Virtual Networks and SFCs for IIoT
W Mandarawi, J Rottmeier, M Rezaeighale, H de Meer
Algorithms 13 (9), 240, 2020
Qos-aware secure live migration of virtual machines
W Mandarawi, A Fischer, H de Meer, E Weishäupl
Multi-objective Network Virtualization and its Applicability to Industrial Networks
W Mandarawi
Universität Passau, 2022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–10