Search for persons
X
?
Proceedings of the 2nd ACM Conference on Reproducibility and Replicability ,
1
Computational Experiment Comprehension using Provenance Sum..:
, In:
?
Proceedings of the 1st Workshop on eBPF and Kernel Extensions ,
2
Unleashing Unprivileged eBPF Potential with Dynamic Sandbox..:
, In:
?
2022 IEEE International Conference on Cloud Engineering (IC2E) ,
3
PACED: Provenance-based Automated Container Escape Detectio:
, In:
?
Proceedings of the ACM Symposium on Cloud Computing ,
5
Secure Namespaced Kernel Audit for Containers:
, In:
?
Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems ,
6
Container Escape Detection for Edge Devices:
, In:
?
Proceedings of the 3rd International Workshop on Practical Reproducible Evaluation of Computer Systems ,
7
Xanthus: Push-button Orchestration of Host Provenance Data ..:
, In:
?
2020 IEEE International Conference on Cloud Engineering (IC2E) ,
8
Facilitating plausible deniability for cloud providers rega..:
, In:
?
Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining ,
9
To Tune or Not to Tune? : In Search of Optimal Configura..:
, In:
?
Heterogeneous Data Management, Polystores, and Analytics for Healthcare; Lecture Notes in Computer Science ,
11
From Here to Provtopia:
, In:
?
Proceedings of the 20th International Middleware Conference ,
13
ProvMark : A Provenance Expressiveness Benchmarking Syst..:
, In:
?
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ,
15