Author of the publication

BASTION: A Security Enforcement Network Stack for Container Networks.

, , , , , and . USENIX ATC, page 81-95. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of the iKee.B iPhone Botnet., , and . MobiSec, volume 47 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 141-152. Springer, (2010)A Security-Mode for Carrier-Grade SDN Controllers., , , , , , , and . ACSAC, page 461-473. ACM, (2017)BLADE: Slashing the Invisible Channel of Drive-by Download Malware., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 350-352. Springer, (2009)An Inside Look at Botnets, and . Special Workshop on Malware Detection, Advances in Information Security, (2006)BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception., , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem., , , , and . KDD, page 1793-1802. ACM, (2017)CLARION: Sound and Clear Provenance Tracking for Microservice Deployments., , , , and . USENIX Security Symposium, page 3989-4006. USENIX Association, (2021)Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks., , , , and . DSN, page 249-260. IEEE Computer Society, (2017)AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks., , , , , and . INFOCOM, page 1788-1797. IEEE, (2020)BASTION: A Security Enforcement Network Stack for Container Networks., , , , , and . USENIX ATC, page 81-95. USENIX Association, (2020)