Search

Your search keyword '"Steve Versteeg"' showing total 47 results

Search Constraints

Start Over You searched for: Author "Steve Versteeg" Remove constraint Author: "Steve Versteeg"
47 results on '"Steve Versteeg"'

Search Results

1. P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages

16. P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages

17. GHTraffic: A Dataset for Reproducible Research in Service-Oriented Computing

18. Interaction Traces Mining for Efficient System Responses Generation

19. Formulating Cost-Effective Monitoring Strategies for Service-Based Systems

20. A framework for ranking of cloud computing services

21. Classification of malware based on integrated static and dynamic features

22. Opaque service virtualisation

23. Enterprise Software Service Emulation: Constructing Large-Scale Testbeds

24. Generalized Suffix Tree based Multiple Sequence Alignment for Service Virtualization

25. Big Data Analytics-Enhanced Cloud Computing: Challenges, Architectural Elements, and Future Directions

26. Generating service models by trace subsequence substitution

28. Automated SLA Negotiation Framework for Cloud Computing

29. A Business Protocol Unit Testing Framework for Web Service Composition

30. Emulation of Cloud-Scale Environments for Scalability Testing

31. A virtual deployment testing environment for enterprise software systems

32. Probabilistic Critical Path Identification for Cost-Effective Monitoring of Service-Based Systems

33. Probabilistic critical path identification for cost-effective monitoring of service-based web applications

34. SMICloud: A Framework for Comparing and Ranking Cloud Services

35. Run-time management and optimization of web service monitoring systems

36. A Case Study on Optimizing Web Service Monitoring Configurations

37. Differentiating malware from cleanware using behavioural analysis

38. Reac2o

39. Classification of Malware Based on String and Function Feature Selection

40. Protecting data in multi-stakeholder web service system

41. Pattern Recognition Techniques for the Classification of Malware Packers

42. Modelling Enterprise System Protocols and Trace Conformance

43. Propagation of Data Protection Requirements in Multi-stakeholder Web Services Systems

44. SOABSE: An approach to realizing business-oriented security requirements with Web Service security policies

45. An automated classification system based on the strings of trojan and virus families

46. Scalable Emulation of Enterprise Systems

47. Function length as a tool for malware classification

Catalog

Books, media, physical & digital resources