Logo of the University of Passau

Waseem Mandarawi

Dr. Waseem Mandarawi

Dr. Waseem Mandarawi
Phone: +49(0)851/509-3026
Fax: +49(0)851/509-1802
Waseem.Mandarawi@uni-passau.de
Room: ZIM 174
Innstraße 33
Passau
Zentrum für Informationstechnologie und Medienmanagement (ZIM)

Publications

This publication material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Articles

Classifying Malware Attacks in IaaS Cloud Environments

N. Rakotondravony, B. Taubmann, W. Mandarawi, E. Weishäupl, P. Xu, B. Kolosnjaji, M. Protsenko, H. de Meer and H. P. Reiser, "Classifying Malware Attacks in IaaS Cloud Environments" , journal of Cloud Computing, Cloud Forensics and Security , vol. 6, no. 1, pp. 26, 2017.

File: https://doi.org/10.1186/s13677-017-0098-8

Policy-based Composition and Embedding of Extended Virtual Networks and SFCs for IIoT

W. Mandarawi, J. Rottmeier, M. Rezaeighale and H. de Meer, "Policy-based Composition and Embedding of Extended Virtual Networks and SFCs for IIoT" , Algorithms, section: Combinatorial Optimization, Graph, and Network Algorithms, Special Issue "Virtual Network Embedding" , vol. 13, no. 9, 2020. MDPI AG, https://www.mdpi.com/1999-4893/13/9/240 .

DOI: 10.3390/a13090240

Contribution to Books

Constraint-based Virtualization of Industrial Networks

W. Mandarawi, A. Fischer, A. M. Houyou, H. Huth and H. de Meer, "Constraint-based Virtualization of Industrial Networks" in Principles of Performance and Reliability Modeling and Evaluation: Essays in Honor of Kishor Trivedi on his 70th Birthday , Fiondella, Lance and Puliafito, Antonio, Eds. Cham: Springer International Publishing, 2016, pp. 567--586.

DOI: 10.1007/978-3-319-30599-8_22

ISBN: 978-3-319-30599-8

Contribution to Proceedings

A Framework for Virtualizing Time-aware Shaper Using High Performance NFV

W. Mandarawi, H. Chahed and H. de Meer, "A Framework for Virtualizing Time-aware Shaper Using High Performance NFV" in Proc. of IEEE 25th International Conference on EmergTechnologies and Factory Automation, ETFA 2020ing , IEEE, 2020. pp. 1621-1628.

DOI: 10.1109/ETFA46521.2020.9211960

CloudIDEA - Cloud Intrusion Detection, Evidence preservation and Analysis

B. Taubmann, H. P. Reiser, T. Kittel, A. Fischer, W. Mandarawi and H. de Meer, "CloudIDEA - Cloud Intrusion Detection, Evidence preservation and Analysis" in Proc. of the 10th European Conf. on Computer Systems (EuroSys 2015) , 2015.

Weblink: http://eurosys2015.labri.fr/program/posters/

File: http://www.net.fim.uni-passau.de/pdf/Taubmann2015a.pdf

CloudIDEA: A Malware Defense Architecture for Cloud Data Centers

A. Fischer, T. Kittel, B. Kolosnjaji, T. K. Lengyel, W. Mandarawi, H. de Meer, T. Mueller, M. Protsenko, H. P. Reiser, B. Taubmann and E. Weishäupl, "CloudIDEA: A Malware Defense Architecture for Cloud Data Centers" in On the Move to Meaningful Internet Systems: OTM 2015 Conferences: Confederated International Conferences: CoopIS, ODBASE, and C{\&}TC 2015, Rhodes, Greece, October 26-30, 2015. Proceedings , Cham: Springer International Publishing, 2015. pp. 594--611.

DOI: 10.1007/978-3-319-26148-5_40

ISBN: 978-3-319-26148-5

Controller of Controllers Architecture for Management of Heterogeneous Industrial Networks

A. Frimpong, S. S. Perez Olaya, D. Krummacker, C. Fischer, A. Winkel, R. Guillaume, L. Wisniewski, M. Ehrlich, W. Mandarawi, H. Trsek, H. de Meer, M. Wollschlaeger, H. D. Schotten and J. Jasperneite, "Controller of Controllers Architecture for Management of Heterogeneous Industrial Networks" in Proc. of 16th IEEE International Conference on Factory Communication Systems (WFCS) , IEEE, 2020. pp. 1-8.

DOI: 10.1109/WFCS47810.2020.9114506

Modeling Security Requirements for VNE algorithms

A. Fischer, R. Kuehn, W. Mandarawi and H. de Meer, "Modeling Security Requirements for VNE algorithms" in Valuetools 2016, 10th EAI International Conference on Performance Evaluation Methodologies and Tools , ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2017. pp. 149--154.

DOI: 10.4108/eai.25-10-2016.2266673

ISBN: 978-1-63190-141-6

File: http://www.uni-passau.de/fileadmin/files/lehrstuhl/meer/publications/pdf/Fischer2016b.pdf

Monitoring and Autoscaling IaaS Clouds: A Case for Complex Event Processing on Data Streams

O. Saleh, F. Gropengiesser, H. Betz, W. Mandarawi and K. Sattler, "Monitoring and Autoscaling IaaS Clouds: A Case for Complex Event Processing on Data Streams" in Utility and Cloud Computing (UCC), 2013 IEEE/ACM 6th International Conference on , 2013.

QoS-Aware Secure Live Migration of Virtual Machines

W. Mandarawi, A. Fischer, H. de Meer and E. Weishäupl, "QoS-Aware Secure Live Migration of Virtual Machines" in 2nd International Workshop on security in highly connected IT systems (SHCIS 15) , 2015.

Patents

Device and method for allocating communication resources in a system employing network slicing

A. M. Houyou, A. Fischer, W. Mandarawi, H. de Meer and H. Huth, "Device and method for allocating communication resources in a system employing network slicing", 09 2016.

Please see our chair's publication database for further publications and abstracts as well as for advanced search and filtering capabilities.

I agree that a connection to the Vimeo server will be established when the video is played and that personal data (e.g. your IP address) will be transmitted.
I agree that a connection to the YouTube server will be established when the video is played and that personal data (e.g. your IP address) will be transmitted.
Show video