Follow
Heng Zhang
Title
Cited by
Cited by
Year
C'mon: Monitoring the compliance of cloud services to contracted properties
S Alboghdady, S Winter, A Taha, H Zhang, N Suri
Proceedings of the 12th International Conference on Availability …, 2017
152017
Threat modeling and analysis for the cloud ecosystem
S Manzoor, H Zhang, N Suri
2018 IEEE International Conference on Cloud Engineering (IC2E), 278-281, 2018
142018
Sentry: A novel approach for mitigating application layer DDoS threats
H Zhang, A Taha, R Trapero, J Luna, N Suri
2016 IEEE Trustcom/BigDataSE/ISPA, 465-472, 2016
92016
deQAM: A dependency based indirect monitoring approach for cloud services
H Zhang, R Trapero, J Luna, N Suri
2017 IEEE International Conference on Services Computing (SCC), 27-34, 2017
72017
Technical implementation and feasibility
GL Mikkelsen, K Damgård, H Guldager, JL Jensen, JG Luna, JD Nielsen, ...
Attribute-based Credentials for Trust: Identity in the Information Society …, 2015
32015
Flashlight: a novel monitoring path identification schema for securing cloud services
H Zhang, J Luna, N Suri, R Trapero
Proceedings of the 13th International Conference on Availability …, 2018
22018
Monitoring path discovery for supporting indirect monitoring of cloud services
H Zhang, S Manzoor, N Suri
2018 IEEE International Conference on Cloud Engineering (IC2E), 274-277, 2018
22018
Whetstone: Reliable Monitoring of Cloud Services
H Zhang, J Luna, R Trapero, N Suri
2018 IEEE International Conference on Smart Computing (SMARTCOMP), 115-122, 2018
12018
D4. 3 Final Perturbation Analysis of the Implementation
J Luna, N Suri, G Pellegrino, H Zhang, M Bladt
2014
Message from the IC2E 2018 Doctoral Symposium Chair
H Zhang, S Manzoor, N Suri
The system can't perform the operation now. Try again later.
Articles 1–10