Author:
Maamar Zakaria,Sellami Mohamed,Masmoudi Fatma
Publisher
Springer International Publishing
Reference15 articles.
1. Agarwal, A., Prasad, A., Rustogi, R., Mishra, S.: Detection and mitigation of fraudulent resource consumption attacks in cloud using deep learning approach. J. Inf. Secur. Appl. 56 (2021)
2. Bellaaj, F., Brabra, H., Sellami, M., Gaaloul, W., Bhiri, S.: A transactional approach for reliable elastic cloud resources. In: Proceedings of SCC 2019, Milan, Italy (2019)
3. Cades, D., Werner, N., Trafton, J., Boehm-Davis, D., Monk, C.: Dealing with interruptions can be complex, but does interruption complexity matter: a mental resources approach to quantifying disruptions. In: Proceedings of the Human Factors and Ergonomics Society, 1 (2008)
4. Calheiros, R., Ranjan, R., Beloglazov, A., De Rose, C., Buyya, R.: CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Pract. Exper. 41(1) (2011)
5. Clarke, E., Emerson, E.: Design and synthesis of synchronization skeletons using branching time temporal logic. In: 25 Years of Model Checking - History, Achievements, Perspectives, vol. 5000 (2008)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Time-Constrained, Event-Driven Coordination of Composite Resources’ Consumption Flows;Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering;2023
2. On Modelling and Analyzing Composite Resources’ Consumption Cycles using Time Petri-Nets;Proceedings of the 17th International Conference on Evaluation of Novel Approaches to Software Engineering;2022
3. An Approach for Mitigating Disruptions on Resources’ Consumption Cycles;Advanced Information Networking and Applications;2022