Steve Versteeg
Cited by
Cited by
A framework for ranking of cloud computing services
SK Garg, S Versteeg, R Buyya
Future Generation Computer Systems 29 (4), 1012-1023, 2013
Smicloud: A framework for comparing and ranking cloud services
SK Garg, S Versteeg, R Buyya
2011 Fourth IEEE International Conference on Utility and Cloud Computing …, 2011
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
2010 5th international conference on malicious and unwanted software, 23-30, 2010
Function length as a tool for malware classification
R Tian, LM Batten, SC Versteeg
2008 3rd international conference on malicious and unwanted software …, 2008
Predicting bug-fixing time: an empirical study of commercial software projects
H Zhang, L Gong, S Versteeg
2013 35th International Conference on Software Engineering (ICSE), 1042-1051, 2013
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
2009 4th International Conference on Malicious and Unwanted Software …, 2009
SLA-based resource provisioning for hosted software-as-a-service applications in cloud computing environments
L Wu, SK Garg, S Versteeg, R Buyya
IEEE Transactions on services computing 7 (3), 465-485, 2013
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
Automated SLA negotiation framework for cloud computing
L Wu, SK Garg, R Buyya, C Chen, S Versteeg
2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid …, 2013
Pattern recognition techniques for the classification of malware packers
L Sun, S Versteeg, S Boztaş, T Yann
Australasian Conference on Information Security and Privacy, 370-390, 2010
Big data analytics-enhanced cloud computing: Challenges, architectural elements, and future directions
R Buyya, K Ramamohanarao, C Leckie, RN Calheiros, AV Dastjerdi, ...
2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015
Machine learning-derived universal connector
NA Hastings, SC Versteeg, JS Bird, X Yao
US Patent 10,089,384, 2018
Formulating cost-effective monitoring strategies for service-based systems
Q He, J Han, Y Yang, H Jin, JG Schneider, S Versteeg
IEEE Transactions on Software Engineering 40 (5), 461-482, 2013
Rolevat: Visual assessment of practical need for role based access control
D Zhang, K Ramamohanarao, S Versteeg, R Zhang
2009 Annual Computer Security Applications Conference, 13-22, 2009
On the effectiveness of isolation‐based anomaly detection in cloud data centers
RN Calheiros, K Ramamohanarao, R Buyya, C Leckie, S Versteeg
Concurrency and Computation: Practice and Experience 29 (18), e4169, 2017
Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study
L Sun, S Versteeg, S Boztas, A Rao
arXiv preprint arXiv:1609.06676, 2016
Assessing the performance impact of service monitoring
G Heward, I Müller, J Han, JG Schneider, S Versteeg
2010 21st Australian Software Engineering Conference, 192-201, 2010
Scalable emulation of enterprise systems
C Hine, JG Schneider, J Han, S Versteeg
2009 Australian Software Engineering Conference, 142-151, 2009
A conceptual framework for unified and comprehensive SOA management
I Müller, J Han, JG Schneider, S Versteeg
International Conference on Service-Oriented Computing, 28-40, 2008
The system can't perform the operation now. Try again later.
Articles 1–20