Search for persons
X
?
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy ,
5
CCSM: Building Cross-Cluster Security Models for Edge-Core ..:
, In:
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
6
Evaluating the Security Posture of 5G Networks by Combining..:
, In:
?
ICC 2023 - IEEE International Conference on Communications ,
8
Warping the Defence Timeline: Non-Disruptive Proactive Atta..:
, In:
?
2023 IFIP Networking Conference (IFIP Networking) ,
9
5GShield: HTTP/2 Anomaly Detection in 5G Service-Based Arch..:
, In:
?
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy ,
10
A Tenant-based Two-stage Approach to Auditing the Integrity..:
, In:
?
Secure IT Systems; Lecture Notes in Computer Science ,
12
VinciDecoder: Automatically Interpreting Provenance Graphs ..:
, In:
?
2022 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) ,
13
A Hybrid Decision-making Approach to Security Metrics Aggre..:
, In:
?
2022 IEEE Future Networks World Forum (FNWF) ,
14
Cloud Native Applications Profiling using a Graph Neural Ne..:
, In:
?
Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy ,
15