Quantitative assessment of cloud security level agreements: A case study J Luna, H Ghani, T Vateva, N Suri Proc. of Security and Cryptography 2 (6), 64-73, 2012 | 48 | 2012 |
Securing the cloud-assisted smart grid K Demir, H Ismail, T Vateva-Gurova, N Suri International Journal of Critical Infrastructure Protection 23, 100-111, 2018 | 21 | 2018 |
Security Requirements Engineering in Safety‐Critical Railway Signalling Networks M Heinrich, T Vateva-Gurova, T Arul, S Katzenbeisser, N Suri, H Birkholz, ... Security and Communication Networks 2019 (1), 8348925, 2019 | 18 | 2019 |
Threat modeling the cloud: An ontology based approach S Manzoor, T Vateva-Gurova, R Trapero, N Suri Information and Operational Technology Security Systems: First International …, 2019 | 18 | 2019 |
Challenges and approaches in securing safety-relevant railway signalling C Schlehuber, M Heinrich, T Vateva-Gurova, S Katzenbeisser, N Suri 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2017 | 17 | 2017 |
A security architecture for railway signalling C Schlehuber, M Heinrich, T Vateva-Gurova, S Katzenbeisser, N Suri Computer Safety, Reliability, and Security: 36th International Conference …, 2017 | 16 | 2017 |
The Impact of Hypervisor Scheduling on Compromising Virtualized Environments T Vateva-Gurova, S Neeraj, M Avi Dependable, Autonomic and Secure Computing (DASC), 17, 2015 | 11 | 2015 |
Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments T Vateva-Gurova, J Luna, G Pellegrino, N Suri 2014 11th international conference on security and cryptography (SECRYPT), 1-12, 2014 | 8 | 2014 |
Negotiating and brokering cloud resources based on security level agreements JL Garcia, T Vateva-Gurova, N Suri, M Rak, L Liccardo Special Session on Security Governance and SLAs in Cloud Computing 2, 533-541, 2013 | 8 | 2013 |
On the detection of side-channel attacks T Vateva-Gurova, N Suri 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing …, 2018 | 7 | 2018 |
Towards a framework for benchmarking privacy-abc technologies F Veseli, T Vateva-Gurova, I Krontiris, K Rannenberg, N Suri IFIP International Information Security Conference, 197-204, 2014 | 7 | 2014 |
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems. H Birkholz, C Krauß, M Zhdanova, D Kuzhiyelil, T Arul, M Heinrich, ... MILS@ DSN, 2018 | 4 | 2018 |
SecLA-based negotiation and brokering of cloud resources J Luna, T Vateva-Gurova, N Suri, M Rak, A De Benedictis Cloud Computing and Services Science: Third International Conference, CLOSER …, 2014 | 3 | 2014 |
Using the phone with a single input signal only: evaluation of 3dscan's telephone module. TV Torsten Felzer, Stephan Rinderknecht ASSETS 2010, 293-294, 2010 | 2* | 2010 |
Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level T Vateva-Gurova, S Manzoor, R Trapero, N Suri Information and Operational Technology Security Systems: First International …, 2019 | 1 | 2019 |
InfoLeak: Scheduling-Based Information Leakage T Vateva-Gurova, S Manzoor, Y Huang, N Suri 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing …, 2018 | 1 | 2018 |
On the Feasibility of Side-Channel Attacks in a Virtualized Environment T Vateva-Gurova, J Luna, G Pellegrino, N Suri E-Business and Telecommunications: 11th International Joint Conference …, 2015 | 1 | 2015 |
Analysis and Detection of Cache-Based Exploits T Vateva-Gurova Technische Universität, 2020 | | 2020 |
Comparison of Mechanisms MØ Pedersen, GL Mikkelsen, F Veseli, A Sabouri, T Vateva-Gurova Attribute-based Credentials for Trust: Identity in the Information Society …, 2015 | | 2015 |
D3. 1 Scientific comparison of ABC protocols F Veseli, T Vateva-Gurova, A Sabouri, MØ Pedersen, J Luna | | 2014 |