Monitoring and autoscaling IaaS clouds: a case for complex event processing on data streams O Saleh, F Gropengießer, H Betz, W Mandarawi, KU Sattler 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing …, 2013 | 25 | 2013 |
Classifying malware attacks in IaaS cloud environments N Rakotondravony, B Taubmann, W Mandarawi, E Weishäupl, P Xu, ... Journal of Cloud Computing 6 (1), 26, 2017 | 19 | 2017 |
CloudIDEA: a malware defense architecture for cloud data centers A Fischer, T Kittel, B Kolosnjaji, TK Lengyel, W Mandarawi, H de Meer, ... OTM Confederated International Conferences" On the Move to Meaningful …, 2015 | 11 | 2015 |
Modeling security requirements for VNE algorithms A Fischer, R Kühn, W Mandarawi, H de Meer proceedings of the 10th EAI International Conference on Performance …, 2017 | 6 | 2017 |
Constraint-based virtualization of industrial networks W Mandarawi, A Fischer, AM Houyou, HP Huth, H De Meer Principles of Performance and Reliability Modeling and Evaluation, 567-586, 2016 | 3 | 2016 |
A Framework for Virtualizing Time-aware Shaper Using High Performance NFV W Mandarawi, H Chahed, H de Meer 2020 25th IEEE International Conference on Emerging Technologies and Factory …, 2020 | 1 | 2020 |
Qos-aware secure live migration of virtual machines W Mandarawi, A Fischer, H de Meer, E Weishäupl | 1 | 2015 |
Policy-Based Composition and Embedding of Extended Virtual Networks and SFCs for IIoT W Mandarawi, J Rottmeier, M Rezaeighale, H de Meer Algorithms 13 (9), 240, 2020 | | 2020 |