From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack., , , , , и . CODASPY, стр. 195-206. ACM, (2016)Security Auditing of Internet of Things Devices in a Smart Home., , и . IFIP Int. Conf. Digital Forensics, том 612 из IFIP Advances in Information and Communication Technology, стр. 213-234. Springer, (2021)ProSAS: Proactive Security Auditing System for Clouds., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (4): 2517-2534 (2022)Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains., , , , , , и . CNS, стр. 245-253. IEEE, (2021)Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring., , , , , , , и . ESORICS (2), том 14345 из Lecture Notes in Computer Science, стр. 123-144. Springer, (2023)Learning probabilistic dependencies among events for proactive security auditing in clouds., , , , , , , и . J. Comput. Secur., 27 (2): 165-202 (2019)Proactively Extracting IoT Device Capabilities: An Application to Smart Homes., , и . DBSec, том 12122 из Lecture Notes in Computer Science, стр. 42-63. Springer, (2020)Towards an Attention-Based Accurate Intrusion Detection Approach., , , и . QSHINE, том 402 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 261-279. Springer, (2021)ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack., , , , , , , и . ACM Trans. Priv. Secur., 22 (1): 1:1-1:35 (2019)User-Level Runtime Security Auditing for the Cloud., , , , , , и . IEEE Trans. Inf. Forensics Secur., 13 (5): 1185-1199 (2018)