Aleksandar Hudic
Aleksandar Hudic
Postgraduate Student at Vienna University of Technology
Verified email at
Cited by
Cited by
Model based process to support security and privacy requirements engineering
S Islam, H Mouratidis, C Kalloniatis, A Hudic, L Zechner
International Journal of Secure Software Engineering (IJSSE) 3 (3), 1-22, 2012
Data confidentiality using fragmentation in cloud computing
A Hudic, S Islam, P Kieseberg, S Rennert, ER Weippl
International Journal of Pervasive Computing and Communications, 2013
Security assurance assessment methodology for hybrid clouds
A Hudic, P Smith, ER Weippl
Computers & Security 70, 723-743, 2017
Impact of critical infrastructure requirements on service migration guidelines to the cloud
C Wagner, A Hudic, S Maksuti, M Tauber, F Pallas
2015 3rd International Conference on Future Internet of Things and Cloud, 1-8, 2015
A multi-layer and multitenant cloud assurance evaluation methodology
A Hudic, M Tauber, T Lorünser, M Krotsiani, G Spanoudakis, A Mauthe, ...
2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014
Towards continuous cloud service assurance for critical infrastructure it
A Hudic, T Hecht, M Tauber, A Mauthe, SC Elvira
2014 International Conference on Future Internet of Things and Cloud, 175-182, 2014
Towards a unified penetration testing taxonomy
A Hudic, L Zechner, S Islam, C Krieg, ER Weippl, S Winkler, R Hable
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
Harmonized monitoring for high assurance clouds
A Bicaku, S Balaban, MG Tauber, A Hudic, A Mauthe, D Hutchison
2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW …, 2016
Categorization of standards, guidelines and tools for secure system design for critical infrastructure it in the cloud
S Paudel, M Tauber, C Wagner, A Hudic, WK Ng
2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014
Book review: Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
A Hudic, E Weippl
Computers and Security 31 (4), 629, 2012
Towards a unified secure cloud service development and deployment life-cycle
A Hudic, M Flittner, T Lorünser, PM Radl, R Bless
2016 11th International Conference on Availability, Reliability and Security …, 2016
Towards resilience metrics for future cloud applications
M Novak, SNUH Shirazi, A Hudic, T Hecht, M Tauber, D Hutchison, ...
SCITEPRESS–Science and Technology Publications, 2016
Automated analysis of underground marketplaces
A Hudic, K Krombholz, T Otterbein, C Platzer, E Weippl
IFIP International Conference on Digital Forensics, 31-42, 2014
A generation method of cryptographic keys for enterprise communication systems
A Hudic, E Revell, DE Simos
2013 International Conference on Availability, Reliability and Security, 406-411, 2013
A Custom-classification of Communication Flow in a Client-server Model
A Hudic, E Revell, AB Kelisec, DE Simos
Eine Architektur f ur sichere Smart Grids inOsterreich
O Jung, S Fenz, M Kammerstetter, A Hudic
Beiträge in Tagungsbänden
A Jung, G Tauböck, F Hlawatsch
M Barbosa, C Brzuska, J Camenisch, D Demirel, S Fischer-Hübner, ...
Workshop Program Committee
A Hudic, S Magliveras, A Angelakis, P Kieseberg, Z Varbanov, C Krieg, ...
The system can't perform the operation now. Try again later.
Articles 1–19