A framework for ranking of cloud computing services SK Garg, S Versteeg, R Buyya Future Generation Computer Systems 29 (4), 1012-1023, 2013 | 1204 | 2013 |
Smicloud: A framework for comparing and ranking cloud services SK Garg, S Versteeg, R Buyya 2011 Fourth IEEE International Conference on Utility and Cloud Computing …, 2011 | 515 | 2011 |
Classification of malware based on integrated static and dynamic features R Islam, R Tian, LM Batten, S Versteeg Journal of Network and Computer Applications 36 (2), 646-656, 2013 | 380 | 2013 |
Differentiating malware from cleanware using behavioural analysis R Tian, R Islam, L Batten, S Versteeg 2010 5th international conference on malicious and unwanted software, 23-30, 2010 | 257 | 2010 |
Predicting bug-fixing time: an empirical study of commercial software projects H Zhang, L Gong, S Versteeg 2013 35th International Conference on Software Engineering (ICSE), 1042-1051, 2013 | 243 | 2013 |
Function length as a tool for malware classification R Tian, LM Batten, SC Versteeg 2008 3rd international conference on malicious and unwanted software …, 2008 | 184 | 2008 |
SLA-based resource provisioning for hosted software-as-a-service applications in cloud computing environments L Wu, SK Garg, S Versteeg, R Buyya IEEE Transactions on services computing 7 (3), 465-485, 2013 | 182 | 2013 |
An automated classification system based on the strings of trojan and virus families R Tian, L Batten, R Islam, S Versteeg 2009 4th International conference on malicious and unwanted software …, 2009 | 179 | 2009 |
Classification of malware based on string and function feature selection R Islam, R Tian, L Batten, S Versteeg 2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010 | 116 | 2010 |
Automated SLA negotiation framework for cloud computing L Wu, SK Garg, R Buyya, C Chen, S Versteeg 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid …, 2013 | 93 | 2013 |
Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study L Sun, S Versteeg, S Boztas, A Rao arXiv preprint arXiv:1609.06676, 2016 | 88 | 2016 |
Pattern recognition techniques for the classification of malware packers L Sun, S Versteeg, S Boztaş, T Yann Australasian Conference on Information Security and Privacy, 370-390, 2010 | 68 | 2010 |
Machine learning-derived universal connector NA Hastings, SC Versteeg, JS Bird, X Yao US Patent 10,089,384, 2018 | 58 | 2018 |
Publicly readable blockchain registry of personally identifiable information breaches SC Versteeg, NA Hastings, X Yao, JS Bird US Patent 10,084,762, 2018 | 52 | 2018 |
On the effectiveness of isolation‐based anomaly detection in cloud data centers RN Calheiros, K Ramamohanarao, R Buyya, C Leckie, S Versteeg Concurrency and Computation: Practice and Experience 29 (18), e4169, 2017 | 52 | 2017 |
Big data analytics-enhanced cloud computing: Challenges, architectural elements, and future directions R Buyya, K Ramamohanarao, C Leckie, RN Calheiros, AV Dastjerdi, ... 2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015 | 51 | 2015 |
Formulating cost-effective monitoring strategies for service-based systems Q He, J Han, Y Yang, H Jin, JG Schneider, S Versteeg IEEE Transactions on Software Engineering 40 (5), 461-482, 2013 | 42 | 2013 |
Rolevat: Visual assessment of practical need for role based access control D Zhang, K Ramamohanarao, S Versteeg, R Zhang 2009 Annual Computer Security Applications Conference, 13-22, 2009 | 36 | 2009 |
Scalable emulation of enterprise systems C Hine, JG Schneider, J Han, S Versteeg 2009 Australian Software Engineering Conference, 142-151, 2009 | 30 | 2009 |
Assessing the performance impact of service monitoring G Heward, I Müller, J Han, JG Schneider, S Versteeg 2010 21st Australian Software Engineering Conference, 192-201, 2010 | 29 | 2010 |