From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

User-Level Runtime Security Auditing for the Cloud., , , , , , и . IEEE Trans. Inf. Forensics Secur., 13 (5): 1185-1199 (2018)ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack., , , , , , , и . ACM Trans. Priv. Secur., 22 (1): 1:1-1:35 (2019)Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack., , , , , , и . ESORICS (1), том 9878 из Lecture Notes in Computer Science, стр. 47-66. Springer, (2016)Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack., , , , , и . CODASPY, стр. 195-206. ACM, (2016)ProSAS: Proactive Security Auditing System for Clouds., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (4): 2517-2534 (2022)A Survey and a Layered Taxonomy of Software-Defined Networking., , и . IEEE Commun. Surv. Tutorials, 16 (4): 1955-1980 (2014)QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud., , , , , , и . CloudCom, стр. 163-170. IEEE Computer Society, (2018)Cloud Security Auditing, , , , , , , , , и . Advances in Information Security Springer, (2019)NFV security survey in 5G networks: A three-dimensional threat taxonomy., , , и . Comput. Networks, (2021)TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation., , , , , , , и . NDSS, The Internet Society, (2017)