Aleksandar Hudic

According to our database1, Aleksandar Hudic authored at least 15 papers between 2012 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Security assurance assessment methodology for hybrid clouds.
Comput. Secur., 2017

Security Viewpoint in a Reference Architecture Model for Cyber-Physical Production Systems.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

2016
Harmonized Monitoring for High Assurance Clouds.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

Towards Resilience Metrics for Future Cloud Applications.
Proceedings of the CLOSER 2016, 2016

Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Impact of Critical Infrastructure Requirements on Service Migration Guidelines to the Cloud.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

2014
Automated Analysis of Underground Marketplaces.
Proceedings of the Advances in Digital Forensics X, 2014

Towards Continuous Cloud Service Assurance for Critical Infrastructure IT.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

Categorization of Standards, Guidelines and Tools for Secure System Design for Critical Infrastructure IT in the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

A Multi-layer and MultiTenant Cloud Assurance Evaluation Methodology.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2013
Data Confidentiality using Fragmentation in Cloud Computing.
Int. J. Pervasive Comput. Commun., 2013

A Generation Method of Cryptographic Keys for Enterprise Communication Systems.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Model Based Process to Support Security and Privacy Requirements Engineering.
Int. J. Secur. Softw. Eng., 2012

Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure.
Comput. Secur., 2012

Towards a Unified Penetration Testing Taxonomy.
Proceedings of the 2012 International Conference on Privacy, 2012


  Loading...