Fault tolerance management in cloud computing: A system-level perspective R Jhawar, V Piuri, M Santambrogio Systems Journal 7 (2), 288--297, 2013 | 256 | 2013 |
Fault Tolerance and Resilience in Cloud Computing Environments R Jhawar, V Piuri Computer and Information Security Handbook, 2nd edition, J. Vacca (ed.), 2013 | 132* | 2013 |
A comprehensive conceptual system-level approach to fault tolerance in cloud computing R Jhawar, V Piuri, M Santambrogio 2012 IEEE International Systems Conference SysCon 2012, 1-5, 2012 | 128 | 2012 |
Attack trees with sequential conjunction R Jhawar, B Kordy, S Mauw, S Radomirović, R Trujillo-Rasua ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 117 | 2015 |
Fault tolerance management in IaaS clouds R Jhawar, V Piuri 2012 IEEE First AESS European Conference on Satellite Telecommunications …, 2012 | 91 | 2012 |
Supporting security requirements for resource management in cloud computing R Jhawar, V Piuri, P Samarati 2012 IEEE 15th International Conference on Computational Science and …, 2012 | 85 | 2012 |
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0 O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua 13th International Conference on Quantitative Evaluation of SysTems (QEST 2016), 2016 | 59 | 2016 |
Refinement-aware generation of attack trees O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, TAC Willemse Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017 | 27 | 2017 |
A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees R Jhawar, K Lounis, S Mauw 12th International Workshop on Security and Trust Management, 2016 | 26 | 2016 |
Semi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library R Jhawar, K Lounis, S Mauw, Y Ramırez-Cruz STM, 2018 | 20 | 2018 |
Computer and Information Security Handbook R Jhawar, V Piuri Elsevier, Waltham, 2013 | 17 | 2013 |
Dependability Certification of Services: A Model-Based Approach CA Ardagna, R Jhawar, V Piuri Springer Computing Journal, 2013 | 16 | 2013 |
Make mine a quadruple: Strengthening the security of graphical one-time pin authentication R Jhawar, P Inglesant, N Courtois, MA Sasse 2011 5th International Conference on Network and System Security, 81-88, 2011 | 16 | 2011 |
Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing R Jhawar, V Piuri The 10th International Conference on Security and Cryptography (SECRYPT 2013), 2013 | 12 | 2013 |
A model-based approach to reliability certification of services CA Ardagna, E Damiani, R Jhawar, V Piuri 2012 6th IEEE International Conference on Digital Ecosystems and …, 2012 | 12 | 2012 |
Reliable Mission Deployment in Vulnerable Distributed Systems M Albanese, S Jajodia, R Jhawar, V Piuri The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and …, 2013 | 11 | 2013 |
Dependable and Resilient Cloud Computing M Albanese, S Jajodia, R Jhawar, V Piuri 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE), 2016 | 7 | 2016 |
Securing Mission-Centric Operations in the Cloud⋆ M Albanese, S Jajodia, R Jhawar, V Piuri Secure Cloud Computing, 2013 | 6 | 2013 |
Dependability-oriented resource management schemes for cloud computing data centers R Jhawar, V Piuri Handbook on Data Centers, 1285-1305, 2015 | 4 | 2015 |
Automating Cyber Defence Responses Using Attack-Defence Trees and Game Theory R Jhawar, S Mauw, I Zakiuddin 15th European Conference on Cyber Warfare and Security, 163-172, 2016 | 3 | 2016 |