2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) 2018
DOI: 10.1109/nca.2018.8548250
|View full text |Cite
|
Sign up to set email alerts
|

Model of a Virtual Firewall Based on Stochastic Petri Nets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
2
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
0
2
2
Order By: Relevance
“…Our work is different from the above cited works [20][21][22][23][24][25][26][27][28][29] in four aspects. First, to the best of our knowledge we are the first to explore SPNs for modeling a mission-oriented ADIoTS, whereas the above cited works [20][21][22][23][24][25][26][27][28][29] utilize SPN techniques mainly for reliability and performance analysis of wireless networks or cyber physical systems.…”
Section: Related Workcontrasting
confidence: 81%
See 2 more Smart Citations
“…Our work is different from the above cited works [20][21][22][23][24][25][26][27][28][29] in four aspects. First, to the best of our knowledge we are the first to explore SPNs for modeling a mission-oriented ADIoTS, whereas the above cited works [20][21][22][23][24][25][26][27][28][29] utilize SPN techniques mainly for reliability and performance analysis of wireless networks or cyber physical systems.…”
Section: Related Workcontrasting
confidence: 81%
“…Our work is different from the above cited works [20][21][22][23][24][25][26][27][28][29] in four aspects. First, to the best of our knowledge we are the first to explore SPNs for modeling a mission-oriented ADIoTS, whereas the above cited works [20][21][22][23][24][25][26][27][28][29] utilize SPN techniques mainly for reliability and performance analysis of wireless networks or cyber physical systems. In our work, we adopt SPN modeling techniques to specifically model and analyze the security property of a mission-oriented ADIoTS operating under our proposed collusion-aware voting-based IDS (CAVBIDS) scheme.…”
Section: Related Workcontrasting
confidence: 81%
See 1 more Smart Citation
“…So illustrating the approach with a use case that shows how you can use the various deployment options to satisfy tenant and cloud provider needs. Zabala et al [13] present the modelling of a virtual firewall based on SPN to analyze the performance in terms of throughput and delay. Mendonça et al [14] present an integrated experience-model approach to evaluating cloud-based disaster recovery solutions.…”
Section: Related Workmentioning
confidence: 99%