Author of the publication

HoneyChart: Automated Honeypot Management over Kubernetes.

, , , , , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 321-328. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling, Simulating and Configuring Programmable Wireless Environments for Multi-User Multi-Objective Networking., , , , , and . CoRR, (2018)Cyber-Ranges as a Mean of Security Culture Establishment., , and . ERCIM News, (2020)On the Network-Layer Modeling and Configuration of Programmable Wireless Environments., , , , , and . IEEE/ACM Trans. Netw., 27 (4): 1696-1713 (2019)A novel communication paradigm for high capacity and security via programmable indoor wireless environments in next generation wireless systems., , , , , and . Ad Hoc Networks, (2019)Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures., , , and . IEEE/ACM Trans. Netw., 25 (3): 1593-1606 (2017)Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context Analysis., , , , , , , and . CoRR, (2018)An Interpretable Neural Network for Configuring Programmable Wireless Environments., , , , , and . SPAWC, page 1-5. IEEE, (2019)Advanced Physical-layer Security as an App in Programmable Wireless Environments., , , , , , and . SPAWC, page 1-5. IEEE, (2020)The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks., , , and . ACM Trans. Priv. Secur., 23 (4): 19:1-19:31 (2020)Discovery and Classification of Twitter Bots., , , , , , and . SN Comput. Sci., 3 (3): 255 (2022)