Author of the publication

Understanding Security Implications of Using Containers in the Cloud.

, , , , , and . USENIX ATC, page 313-319. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BlackEye: automatic IP blacklisting using machine learning from security logs., and . Wirel. Networks, 28 (2): 937-948 (2022)Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G Networks., , and . ICDCS, page 413-422. IEEE Computer Society, (2011)AppCloak: Rapid Migration of Legacy Applications into Cloud., and . IEEE CLOUD, page 810-817. IEEE Computer Society, (2014)Log-based Abnormal Task Detection and Root Cause Analysis for Spark., , , , , and . ICWS, page 389-396. IEEE, (2017)PseudoApp: Performance prediction for application migration to cloud., , , and . IM, page 303-310. IEEE, (2013)EDGESTORE: A Single Namespace and Resource-Aware Federation File System for Edge Servers., , , , and . EDGE, page 101-108. IEEE Computer Society, (2018)Dissecting Open Source Cloud Evolution: An OpenStack Case Study., , , and . HotCloud, USENIX Association, (2013)Security Analysis of Container Images Using Cloud Analytics Framework., , , , and . ICWS, volume 10966 of Lecture Notes in Computer Science, page 116-133. Springer, (2018)CAP3: A Cloud Auto-Provisioning Framework for Parallel Processing Using On-Demand and Spot Instances., , , , and . IEEE CLOUD, page 228-235. IEEE Computer Society, (2013)Understanding Security Implications of Using Containers in the Cloud., , , , , and . USENIX ATC, page 313-319. USENIX Association, (2017)