Folgen
Steve Versteeg
Steve Versteeg
Bestätigte E-Mail-Adresse bei microsoft.com
Titel
Zitiert von
Zitiert von
Jahr
A framework for ranking of cloud computing services
SK Garg, S Versteeg, R Buyya
Future Generation Computer Systems 29 (4), 1012-1023, 2013
11932013
Smicloud: A framework for comparing and ranking cloud services
SK Garg, S Versteeg, R Buyya
2011 Fourth IEEE International Conference on Utility and Cloud Computing …, 2011
5072011
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
3662013
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
2010 5th international conference on malicious and unwanted software, 23-30, 2010
2492010
Predicting bug-fixing time: an empirical study of commercial software projects
H Zhang, L Gong, S Versteeg
2013 35th International Conference on Software Engineering (ICSE), 1042-1051, 2013
2392013
Function length as a tool for malware classification
R Tian, LM Batten, SC Versteeg
2008 3rd international conference on malicious and unwanted software …, 2008
1822008
SLA-based resource provisioning for hosted software-as-a-service applications in cloud computing environments
L Wu, SK Garg, S Versteeg, R Buyya
IEEE Transactions on services computing 7 (3), 465-485, 2013
1812013
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
2009 4th International conference on malicious and unwanted software …, 2009
1752009
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
1132010
Automated SLA negotiation framework for cloud computing
L Wu, SK Garg, R Buyya, C Chen, S Versteeg
2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid …, 2013
932013
Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study
L Sun, S Versteeg, S Boztas, A Rao
arXiv preprint arXiv:1609.06676, 2016
882016
Pattern recognition techniques for the classification of malware packers
L Sun, S Versteeg, S Boztaş, T Yann
Australasian Conference on Information Security and Privacy, 370-390, 2010
672010
Machine learning-derived universal connector
NA Hastings, SC Versteeg, JS Bird, X Yao
US Patent 10,089,384, 2018
582018
On the effectiveness of isolation‐based anomaly detection in cloud data centers
RN Calheiros, K Ramamohanarao, R Buyya, C Leckie, S Versteeg
Concurrency and Computation: Practice and Experience 29 (18), e4169, 2017
512017
Publicly readable blockchain registry of personally identifiable information breaches
SC Versteeg, NA Hastings, X Yao, JS Bird
US Patent 10,084,762, 2018
502018
Big data analytics-enhanced cloud computing: Challenges, architectural elements, and future directions
R Buyya, K Ramamohanarao, C Leckie, RN Calheiros, AV Dastjerdi, ...
2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015
502015
Formulating cost-effective monitoring strategies for service-based systems
Q He, J Han, Y Yang, H Jin, JG Schneider, S Versteeg
IEEE Transactions on Software Engineering 40 (5), 461-482, 2013
422013
Rolevat: Visual assessment of practical need for role based access control
D Zhang, K Ramamohanarao, S Versteeg, R Zhang
2009 Annual Computer Security Applications Conference, 13-22, 2009
352009
Scalable emulation of enterprise systems
C Hine, JG Schneider, J Han, S Versteeg
2009 Australian Software Engineering Conference, 142-151, 2009
302009
Generating service models by trace subsequence substitution
M Du, JG Schneider, C Hine, J Grundy, S Versteeg
Proceedings of the 9th international ACM Sigsoft conference on Quality of …, 2013
282013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20