default search action
Steve Versteeg
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j13]Md. Arafat Hossain, Jun Han, Jean-Guy Schneider, Jiaojiao Jiang, Muhammad Ashad Kabir, Steve Versteeg:
Extracting Formats of Service Messages with Varying Payloads. ACM Trans. Internet Techn. 22(3): 71:1-71:31 (2022) - 2021
- [j12]Muhammad Ashad Kabir, Jun Han, Md. Arafat Hossain, Steve Versteeg:
SpecMiner: Heuristic-based mining of service behavioral models from interaction traces. Future Gener. Comput. Syst. 117: 59-71 (2021) - [j11]Jiaojiao Jiang, Jean-Guy Schneider, Steve Versteeg, Jun Han, Md. Arafat Hossain, Chengfei Liu:
R-gram: Inferring message formats of service protocols with relative positional n-grams. J. Netw. Comput. Appl. 196: 103247 (2021) - 2020
- [j10]Jiaojiao Jiang, Steve Versteeg, Jun Han, Md. Arafat Hossain, Jean-Guy Schneider:
A positional keyword-based approach to inferring fine-grained message formats. Future Gener. Comput. Syst. 102: 369-381 (2020) - [i11]Muhammad Ashad Kabir, Jun Han, Md. Arafat Hossain, Steve Versteeg:
Heuristic-based Mining of Service Behavioral Models from Interaction Traces. CoRR abs/2011.00431 (2020)
2010 – 2019
- 2019
- [j9]Jiaojiao Jiang, Steve Versteeg, Jun Han, Md. Arafat Hossain, Jean-Guy Schneider, Christopher Leckie, Zeinab Farahmandpour:
P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages. IEEE Access 7: 88504-88516 (2019) - 2018
- [c38]Thilini Bhagya, Jens Dietrich, Hans W. Guesgen, Steve Versteeg:
GHTraffic: A Dataset for Reproducible Research in Service-Oriented Computing. ICWS 2018: 123-130 - [c37]Md. Arafat Hossain, Steve Versteeg, Jun Han, Muhammad Ashad Kabir, Jiaojiao Jiang, Jean-Guy Schneider:
Mining accurate message formats for service APIs. SANER 2018: 266-276 - [i10]Thilini Bhagya, Jens Dietrich, Hans W. Guesgen, Steve Versteeg:
GHTraffic: A Dataset for Reproducible Research in Service-Oriented Computing. CoRR abs/1806.03449 (2018) - 2017
- [j8]Jian Yu, Jun Han, Jean-Guy Schneider, Cameron M. Hine, Steve Versteeg:
A Petri-Net-Based Virtual Deployment Testing Environment for Enterprise Software Systems. Comput. J. 60(1): 27-44 (2017) - [j7]Rodrigo N. Calheiros, Kotagiri Ramamohanarao, Rajkumar Buyya, Christopher Leckie, Steve Versteeg:
On the effectiveness of isolation-based anomaly detection in cloud data centers. Concurr. Comput. Pract. Exp. 29(18) (2017) - [c36]Zeinab Farahmandpour, Steve Versteeg, Jun Han, Anand Kameswaran:
Service Virtualisation of Internet-of-Things Devices: Techniques and Challenges. RCoSE@ICSE 2017: 32-35 - [i9]Zeinab Farahmandpour, Steve Versteeg, Anand Kameswaran, Jun Han:
Service Virtualisation of Internet-of-Things Devices: Techniques and Challenges. CoRR abs/1705.05501 (2017) - 2016
- [c35]Steve Versteeg, Miao Du, John Bird, Jean-Guy Schneider, John C. Grundy, Jun Han:
Enhanced playback of automated service emulation models using entropy analysis. CSED@ICSE 2016: 49-55 - [c34]Cameron M. Hine, Jean-Guy Schneider, Jun Han, Steve Versteeg:
Enterprise software service emulation: constructing large-scale testbeds. CSED@ICSE 2016: 56-62 - [c33]Steven Versteeg, Miao Du, Jean-Guy Schneider, John Grundy, Jun Han, Menka Goyal:
Opaque service virtualisation: a practical tool for emulating endpoint systems. ICSE (Companion Volume) 2016: 202-211 - [i8]Steve Versteeg, Miao Du, John Bird, Jean-Guy Schneider, John C. Grundy, Jun Han:
Enhanced Playback of Automated Service Emulation Models Using Entropy Analysis. CoRR abs/1605.06668 (2016) - [i7]Steve Versteeg, Miao Du, Jean-Guy Schneider, John C. Grundy, Jun Han, Menka Goyal:
Opaque Service Virtualisation: A Practical Tool for Emulating Endpoint Systems. CoRR abs/1605.06670 (2016) - [i6]Cameron M. Hine, Jean-Guy Schneider, Jun Han, Steve Versteeg:
Enterprise Software Service Emulation: Constructing Large-Scale Testbeds. CoRR abs/1605.06729 (2016) - [i5]Jean-Guy Schneider, Peter Mandile, Steve Versteeg:
Generalized Suffix Tree based Multiple Sequence Alignment for Service Virtualization. CoRR abs/1606.01593 (2016) - [i4]Li Sun, Steven Versteeg, Serdar Boztas, Asha Rao:
Detecting Anomalous User Behavior Using an Extended Isolation Forest Algorithm: An Enterprise Case Study. CoRR abs/1609.06676 (2016) - 2015
- [j6]Miao Du, Steven Versteeg, Jean-Guy Schneider, Jun Han, John C. Grundy:
Interaction Traces Mining for Efficient System Responses Generation. ACM SIGSOFT Softw. Eng. Notes 40(1): 1-8 (2015) - [c32]Jean-Guy Schneider, Peter Mandile, Steven Versteeg:
Generalized Suffix Tree Based Multiple Sequence Alignment for Service Virtualization. ASWEC 2015: 48-57 - [c31]Rajkumar Buyya, Kotagiri Ramamohanarao, Christopher Leckie, Rodrigo N. Calheiros, Amir Vahid Dastjerdi, Steven Versteeg:
Big Data Analytics-Enhanced Cloud Computing: Challenges, Architectural Elements, and Future Directions. ICPADS 2015: 75-84 - [i3]Steven Versteeg:
Languages for Mobile Agents. CoRR abs/1507.01656 (2015) - [i2]Miao Du, Steven Versteeg, Jean-Guy Schneider, John C. Grundy, Jun Han:
From Network Traces to System Responses: Opaquely Emulating Software Services. CoRR abs/1510.01421 (2015) - [i1]Rajkumar Buyya, Kotagiri Ramamohanarao, Christopher Leckie, Rodrigo N. Calheiros, Amir Vahid Dastjerdi, Steven Versteeg:
Big Data Analytics-Enhanced Cloud Computing: Challenges, Architectural Elements, and Future Directions. CoRR abs/1510.06486 (2015) - 2014
- [j5]Dana Zhang, Kotagiri Ramamohanarao, Rui Zhang, Steven Versteeg:
Efficient Graph Based Approach to Large Scale Role Engineering. Trans. Data Priv. 7(1): 1-26 (2014) - [j4]Linlin Wu, Saurabh Kumar Garg, Steven Versteeg, Rajkumar Buyya:
SLA-Based Resource Provisioning for Hosted Software-as-a-Service Applications in Cloud Computing Environments. IEEE Trans. Serv. Comput. 7(3): 465-485 (2014) - [j3]Qiang He, Jun Han, Yun Yang, Hai Jin, Jean-Guy Schneider, Steven Versteeg:
Formulating Cost-Effective Monitoring Strategies for Service-Based Systems. IEEE Trans. Software Eng. 40(5): 461-482 (2014) - 2013
- [j2]Saurabh Kumar Garg, Steven Versteeg, Rajkumar Buyya:
A framework for ranking of cloud computing services. Future Gener. Comput. Syst. 29(4): 1012-1023 (2013) - [j1]Md. Rafiqul Islam, Ronghua Tian, Lynn Margaret Batten, Steven Versteeg:
Classification of malware based on integrated static and dynamic features. J. Netw. Comput. Appl. 36(2): 646-656 (2013) - [c30]Jian Yu, Jun Han, Steven O. Gunarso, Steven Versteeg:
A Business Protocol Unit Testing Framework for Web Service Composition. CAiSE 2013: 17-34 - [c29]Linlin Wu, Saurabh Kumar Garg, Rajkumar Buyya, Chao Chen, Steven Versteeg:
Automated SLA Negotiation Framework for Cloud Computing. CCGRID 2013: 235-244 - [c28]Hongyu Zhang, Liang Gong, Steven Versteeg:
Predicting bug-fixing time: an empirical study of commercial software projects. ICSE 2013: 1042-1051 - [c27]Miao Du, Jean-Guy Schneider, Cameron M. Hine, John Grundy, Steven Versteeg:
Generating service models by trace subsequence substitution. QoSA 2013: 123-132 - 2012
- [c26]Qiang He, Jun Han, Yun Yang, Jean-Guy Schneider, Hai Jin, Steven Versteeg:
Probabilistic Critical Path Identification for Cost-Effective Monitoring of Service-Based Systems. IEEE SCC 2012: 178-185 - [c25]Cameron M. Hine, Jean-Guy Schneider, Jun Han, Steven Versteeg:
Quokka: visualising interactions of enterprise software environment emulators. ASE 2012: 370-373 - [c24]Jian Yu, Jun Han, Jean-Guy Schneider, Cameron M. Hine, Steven Versteeg:
A virtual deployment testing environment for enterprise software systems. QoSA 2012: 101-110 - [c23]Steven Versteeg, Cameron M. Hine, Jean-Guy Schneider, Jun Han:
Emulation of Cloud-Scale Environments for Scalability Testing. QSIC 2012: 201-209 - [c22]Qiang He, Jun Han, Yun Yang, Jean-Guy Schneider, Hai Jin, Steven Versteeg:
Probabilistic critical path identification for cost-effective monitoring of service-based web applications. WWW (Companion Volume) 2012: 523-524 - 2011
- [c21]Ingo Müller, Jun Han, Jean-Guy Schneider, Steven Versteeg:
Tackling the Loss of Control: Standards-Based Conjoint Management of Security Requirements for Cloud Services. IEEE CLOUD 2011: 573-581 - [c20]Ingo Müller, Jun Han, Jean-Guy Schneider, Steven Versteeg:
Idea: A Reference Platform for Systematic Information Security Management Tool Support. ESSoS 2011: 256-263 - [c19]Garth Heward, Jun Han, Jean-Guy Schneider, Steven Versteeg:
Run-time management and optimization of web service monitoring systems. SOCA 2011: 1-6 - [c18]Saurabh Kumar Garg, Steven Versteeg, Rajkumar Buyya:
SMICloud: A Framework for Comparing and Ranking Cloud Services. UCC 2011: 210-218 - 2010
- [c17]Li Sun, Steven Versteeg, Serdar Boztas, Trevor Yann:
Pattern Recognition Techniques for the Classification of Malware Packers. ACISP 2010: 370-390 - [c16]Cameron M. Hine, Jean-Guy Schneider, Jun Han, Steven Versteeg:
Modelling Enterprise System Protocols and Trace Conformance. Australian Software Engineering Conference 2010: 35-44 - [c15]Garth Heward, Ingo Müller, Jun Han, Jean-Guy Schneider, Steven Versteeg:
Assessing the Performance Impact of Service Monitoring. Australian Software Engineering Conference 2010: 192-201 - [c14]Dana Zhang, Kotagiri Ramamohanarao, Steven Versteeg, Rui Zhang:
Graph based strategies to role engineering. CSIIRW 2010: 25 - [c13]Garth Heward, Jun Han, Ingo Müller, Jean-Guy Schneider, Steven Versteeg:
A Case Study on Optimizing Web Service Monitoring Configurations. ICSOC Workshops 2010: 4-14 - [c12]Garth Heward, Jun Han, Ingo Müller, Jean-Guy Schneider, Steven Versteeg:
Optimizing the Configuration of Web Service Monitors. ICSOC 2010: 587-595 - [c11]Cameron M. Hine, Jean-Guy Schneider, Steven Versteeg:
Reac2o: a runtime for enterprise system models. ASE 2010: 177-178 - [c10]Ronghua Tian, Md. Rafiqul Islam, Lynn Margaret Batten, Steven Versteeg:
Differentiating malware from cleanware using behavioural analysis. MALWARE 2010: 23-30 - [c9]Tan Phan, Jun Han, Garth Heward, Steven Versteeg:
Propagation of Data Protection Requirements in Multi-stakeholder Web Services Systems. WISE 2010: 67-76 - [c8]Tan Phan, Jun Han, Garth Heward, Steven Versteeg:
Protecting data in multi-stakeholder web service system. WWW 2010: 1163-1164
2000 – 2009
- 2009
- [c7]Dana Zhang, Kotagiri Ramamohanarao, Steven Versteeg, Rui Zhang:
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control. ACSAC 2009: 13-22 - [c6]Cameron M. Hine, Jean-Guy Schneider, Jun Han, Steven Versteeg:
Scalable Emulation of Enterprise Systems. Australian Software Engineering Conference 2009: 142-151 - [c5]Ronghua Tian, Lynn Margaret Batten, Md. Rafiqul Islam, Steven Versteeg:
An automated classification system based on the strings of trojan and virus families. MALWARE 2009: 23-30 - [c4]Tan Phan, Jun Han, Ingo Müller, Malinda Kapuruge, Steven Versteeg:
SOABSE: An approach to realizing business-oriented security requirements with Web Service security policies. SOCA 2009: 1-10 - 2008
- [c3]Ingo Müller, Jun Han, Jean-Guy Schneider, Steven Versteeg:
A Conceptual Framework for Unified and Comprehensive SOA Management. ICSOC Workshops 2008: 28-40 - [c2]Ronghua Tian, Lynn Margaret Batten, Steven Versteeg:
Function length as a tool for malware classification. MALWARE 2008: 69-76 - 2001
- [c1]Steven Versteeg, Alan D. Blair:
Getting the Job Done in a Hostile Environment. Australian Joint Conference on Artificial Intelligence 2001: 507-518
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint