Automated Information Flow Analysis of Virtualized Infrastructures, Proceedings of the 16th European Conference on Research in Computer Security, pp.392-415, 2011. ,
DOI : 10.1007/978-3-642-23822-2_22
Cloud radar, Proceedings of the 30th Annual Computer Security Applications Conference on, ACSAC '14, 2014. ,
DOI : 10.1145/2664243.2664274
Auditing security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack, 6th ACM Conference on Data and Application Security and Privacy ACM CODASPY 2016, 2016. ,
The NIST Definition of Cloud Computing, 2011. ,
DOI : 10.6028/NIST.SP.800-145
Measuring security risk of networks using attack graphs, International Journal of Next- Generation Computing, vol.1, issue.1, 2010. ,
Empirical exploitation of live virtual machine migration, BlackHat DC convention, 2008. ,
Quantitative Security Risk Assessment of Enterprise Networks, 2012. ,
DOI : 10.1007/978-1-4614-1860-3
Liccas: Assessing the likelihood of individual, coordinated, and concurrent attack scenarios, 10th International Conference on Security and Privacy in Communication Networks, p.2014, 2014. ,