This publication material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
N. Rakotondravony, B. Taubmann, W. Mandarawi, E. Weishäupl, P. Xu, B. Kolosnjaji, M. Protsenko, H. de Meer and H. P. Reiser, "Classifying Malware Attacks in IaaS Cloud Environments" , journal of Cloud Computing, Cloud Forensics and Security , vol. 6, no. 1, pp. 26, 2017.
W. Mandarawi, J. Rottmeier, M. Rezaeighale and H. de Meer, "Policy-based Composition and Embedding of Extended Virtual Networks and SFCs for IIoT" , Algorithms, section: Combinatorial Optimization, Graph, and Network Algorithms, Special Issue "Virtual Network Embedding" , vol. 13, no. 9, 2020. MDPI AG, https://www.mdpi.com/1999-4893/13/9/240 .
DOI: 10.3390/a13090240
W. Mandarawi, A. Fischer, A. M. Houyou, H. Huth and H. de Meer, "Constraint-based Virtualization of Industrial Networks" in Principles of Performance and Reliability Modeling and Evaluation: Essays in Honor of Kishor Trivedi on his 70th Birthday , Fiondella, Lance and Puliafito, Antonio, Eds. Cham: Springer International Publishing, 2016, pp. 567--586.
DOI: 10.1007/978-3-319-30599-8_22
ISBN: 978-3-319-30599-8
W. Mandarawi, H. Chahed and H. de Meer, "A Framework for Virtualizing Time-aware Shaper Using High Performance NFV" in Proc. of IEEE 25th International Conference on EmergTechnologies and Factory Automation, ETFA 2020ing , IEEE, 2020. pp. 1621-1628.
B. Taubmann, H. P. Reiser, T. Kittel, A. Fischer, W. Mandarawi and H. de Meer, "CloudIDEA - Cloud Intrusion Detection, Evidence preservation and Analysis" in Proc. of the 10th European Conf. on Computer Systems (EuroSys 2015) , 2015.
Weblink: http://eurosys2015.labri.fr/program/posters/
File: http://www.net.fim.uni-passau.de/pdf/Taubmann2015a.pdf
A. Fischer, T. Kittel, B. Kolosnjaji, T. K. Lengyel, W. Mandarawi, H. de Meer, T. Mueller, M. Protsenko, H. P. Reiser, B. Taubmann and E. Weishäupl, "CloudIDEA: A Malware Defense Architecture for Cloud Data Centers" in On the Move to Meaningful Internet Systems: OTM 2015 Conferences: Confederated International Conferences: CoopIS, ODBASE, and C{\&}TC 2015, Rhodes, Greece, October 26-30, 2015. Proceedings , Cham: Springer International Publishing, 2015. pp. 594--611.
DOI: 10.1007/978-3-319-26148-5_40
ISBN: 978-3-319-26148-5
A. Frimpong, S. S. Perez Olaya, D. Krummacker, C. Fischer, A. Winkel, R. Guillaume, L. Wisniewski, M. Ehrlich, W. Mandarawi, H. Trsek, H. de Meer, M. Wollschlaeger, H. D. Schotten and J. Jasperneite, "Controller of Controllers Architecture for Management of Heterogeneous Industrial Networks" in Proc. of 16th IEEE International Conference on Factory Communication Systems (WFCS) , IEEE, 2020. pp. 1-8.
A. Fischer, R. Kuehn, W. Mandarawi and H. de Meer, "Modeling Security Requirements for VNE algorithms" in Valuetools 2016, 10th EAI International Conference on Performance Evaluation Methodologies and Tools , ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2017. pp. 149--154.
DOI: 10.4108/eai.25-10-2016.2266673
ISBN: 978-1-63190-141-6
File: http://www.uni-passau.de/fileadmin/files/lehrstuhl/meer/publications/pdf/Fischer2016b.pdf
O. Saleh, F. Gropengiesser, H. Betz, W. Mandarawi and K. Sattler, "Monitoring and Autoscaling IaaS Clouds: A Case for Complex Event Processing on Data Streams" in Utility and Cloud Computing (UCC), 2013 IEEE/ACM 6th International Conference on , 2013.
W. Mandarawi, A. Fischer, H. de Meer and E. Weishäupl, "QoS-Aware Secure Live Migration of Virtual Machines" in 2nd International Workshop on security in highly connected IT systems (SHCIS 15) , 2015.
A. M. Houyou, A. Fischer, W. Mandarawi, H. de Meer and H. Huth, "Device and method for allocating communication resources in a system employing network slicing", 09 2016.
Please see our chair's publication database for further publications and abstracts as well as for advanced search and filtering capabilities.