עקוב אחר
Tsvetoslava Vateva-Gurova
Tsvetoslava Vateva-Gurova
כתובת אימייל מאומתת בדומיין deeds.informatik.tu-darmstadt.de
כותרת
צוטט על ידי
צוטט על ידי
שנה
Quantitative assessment of cloud security level agreements: A case study
J Luna, H Ghani, T Vateva, N Suri
Proc. of Security and Cryptography 2 (6), 64-73, 2012
482012
Securing the cloud-assisted smart grid
K Demir, H Ismail, T Vateva-Gurova, N Suri
International Journal of Critical Infrastructure Protection 23, 100-111, 2018
212018
Security Requirements Engineering in Safety‐Critical Railway Signalling Networks
M Heinrich, T Vateva-Gurova, T Arul, S Katzenbeisser, N Suri, H Birkholz, ...
Security and Communication Networks 2019 (1), 8348925, 2019
182019
Threat modeling the cloud: An ontology based approach
S Manzoor, T Vateva-Gurova, R Trapero, N Suri
Information and Operational Technology Security Systems: First International …, 2019
182019
Challenges and approaches in securing safety-relevant railway signalling
C Schlehuber, M Heinrich, T Vateva-Gurova, S Katzenbeisser, N Suri
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2017
172017
A security architecture for railway signalling
C Schlehuber, M Heinrich, T Vateva-Gurova, S Katzenbeisser, N Suri
Computer Safety, Reliability, and Security: 36th International Conference …, 2017
162017
The Impact of Hypervisor Scheduling on Compromising Virtualized Environments
T Vateva-Gurova, S Neeraj, M Avi
Dependable, Autonomic and Secure Computing (DASC), 17, 2015
112015
Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments
T Vateva-Gurova, J Luna, G Pellegrino, N Suri
2014 11th international conference on security and cryptography (SECRYPT), 1-12, 2014
82014
Negotiating and brokering cloud resources based on security level agreements
JL Garcia, T Vateva-Gurova, N Suri, M Rak, L Liccardo
Special Session on Security Governance and SLAs in Cloud Computing 2, 533-541, 2013
82013
On the detection of side-channel attacks
T Vateva-Gurova, N Suri
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing …, 2018
72018
Towards a framework for benchmarking privacy-abc technologies
F Veseli, T Vateva-Gurova, I Krontiris, K Rannenberg, N Suri
IFIP International Information Security Conference, 197-204, 2014
72014
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems.
H Birkholz, C Krauß, M Zhdanova, D Kuzhiyelil, T Arul, M Heinrich, ...
MILS@ DSN, 2018
42018
SecLA-based negotiation and brokering of cloud resources
J Luna, T Vateva-Gurova, N Suri, M Rak, A De Benedictis
Cloud Computing and Services Science: Third International Conference, CLOSER …, 2014
32014
Using the phone with a single input signal only: evaluation of 3dscan's telephone module.
TV Torsten Felzer, Stephan Rinderknecht
ASSETS 2010, 293-294, 2010
2*2010
Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level
T Vateva-Gurova, S Manzoor, R Trapero, N Suri
Information and Operational Technology Security Systems: First International …, 2019
12019
InfoLeak: Scheduling-Based Information Leakage
T Vateva-Gurova, S Manzoor, Y Huang, N Suri
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing …, 2018
12018
On the Feasibility of Side-Channel Attacks in a Virtualized Environment
T Vateva-Gurova, J Luna, G Pellegrino, N Suri
E-Business and Telecommunications: 11th International Joint Conference …, 2015
12015
Analysis and Detection of Cache-Based Exploits
T Vateva-Gurova
Technische Universität, 2020
2020
Comparison of Mechanisms
MØ Pedersen, GL Mikkelsen, F Veseli, A Sabouri, T Vateva-Gurova
Attribute-based Credentials for Trust: Identity in the Information Society …, 2015
2015
D3. 1 Scientific comparison of ABC protocols
F Veseli, T Vateva-Gurova, A Sabouri, MØ Pedersen, J Luna
2014
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20