Search for persons
X
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
2
SoK: A Tale of Reduction, Security, and Correctness - Evalu..:
, In:
?
Proceedings of the 6th on European P4 Workshop ,
3
LANTERN: Layered Adaptive Network Telemetry Collection for ..:
, In:
?
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining ,
6
Augmenting Rule-based DNS Censorship Detection at Scale wit..:
, In:
?
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks ,
8
PROSPER : Extracting Protocol Specifications Using Large..:
, In:
?
Proceedings of the 21st ACM Workshop on Hot Topics in Networks ,
9
A case for remote attestation in programmable dataplanes:
, In:
?
Proceedings of the 1st International Workshop on Emerging Topics in Wireless ,
11
A fine-grained telemetry stream for security services in 5G..:
, In:
?
Proceedings of the 21st Workshop on Privacy in the Electronic Society ,
12
Adversarial Detection of Censorship Measurements:
, In:
?
2022 IEEE International Conference on Cloud Engineering (IC2E) ,
13
PACED: Provenance-based Automated Container Escape Detectio:
, In:
?
Proceedings of the 13th Symposium on Cloud Computing ,
14
QFaaS : accelerating and securing serverless cloud netwo..:
, In:
?
Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies ,
15