关注
Steve Versteeg
Steve Versteeg
在 microsoft.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
A framework for ranking of cloud computing services
SK Garg, S Versteeg, R Buyya
Future Generation Computer Systems 29 (4), 1012-1023, 2013
12042013
Smicloud: A framework for comparing and ranking cloud services
SK Garg, S Versteeg, R Buyya
2011 Fourth IEEE International Conference on Utility and Cloud Computing …, 2011
5152011
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
3802013
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
2010 5th international conference on malicious and unwanted software, 23-30, 2010
2572010
Predicting bug-fixing time: an empirical study of commercial software projects
H Zhang, L Gong, S Versteeg
2013 35th International Conference on Software Engineering (ICSE), 1042-1051, 2013
2432013
Function length as a tool for malware classification
R Tian, LM Batten, SC Versteeg
2008 3rd international conference on malicious and unwanted software …, 2008
1842008
SLA-based resource provisioning for hosted software-as-a-service applications in cloud computing environments
L Wu, SK Garg, S Versteeg, R Buyya
IEEE Transactions on services computing 7 (3), 465-485, 2013
1822013
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
2009 4th International conference on malicious and unwanted software …, 2009
1792009
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
1162010
Automated SLA negotiation framework for cloud computing
L Wu, SK Garg, R Buyya, C Chen, S Versteeg
2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid …, 2013
932013
Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study
L Sun, S Versteeg, S Boztas, A Rao
arXiv preprint arXiv:1609.06676, 2016
882016
Pattern recognition techniques for the classification of malware packers
L Sun, S Versteeg, S Boztaş, T Yann
Australasian Conference on Information Security and Privacy, 370-390, 2010
682010
Machine learning-derived universal connector
NA Hastings, SC Versteeg, JS Bird, X Yao
US Patent 10,089,384, 2018
582018
Publicly readable blockchain registry of personally identifiable information breaches
SC Versteeg, NA Hastings, X Yao, JS Bird
US Patent 10,084,762, 2018
522018
On the effectiveness of isolation‐based anomaly detection in cloud data centers
RN Calheiros, K Ramamohanarao, R Buyya, C Leckie, S Versteeg
Concurrency and Computation: Practice and Experience 29 (18), e4169, 2017
522017
Big data analytics-enhanced cloud computing: Challenges, architectural elements, and future directions
R Buyya, K Ramamohanarao, C Leckie, RN Calheiros, AV Dastjerdi, ...
2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015
512015
Formulating cost-effective monitoring strategies for service-based systems
Q He, J Han, Y Yang, H Jin, JG Schneider, S Versteeg
IEEE Transactions on Software Engineering 40 (5), 461-482, 2013
422013
Rolevat: Visual assessment of practical need for role based access control
D Zhang, K Ramamohanarao, S Versteeg, R Zhang
2009 Annual Computer Security Applications Conference, 13-22, 2009
362009
Scalable emulation of enterprise systems
C Hine, JG Schneider, J Han, S Versteeg
2009 Australian Software Engineering Conference, 142-151, 2009
302009
Assessing the performance impact of service monitoring
G Heward, I Müller, J Han, JG Schneider, S Versteeg
2010 21st Australian Software Engineering Conference, 192-201, 2010
292010
系统目前无法执行此操作,请稍后再试。
文章 1–20