Author of the publication

Stay at the Helm: secure Kubernetes deployments via graph generation and attack reconstruction.

, and . CLOUD, page 59-69. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Digital Twin for the 5G Era: the SPIDER Cyber Range., , , , , , , , , and 2 other author(s). WoWMoM, page 567-572. IEEE, (2022)Traffic monitoring and DDoS detection using stateful SDN., , , , and . NetSoft, page 1-2. IEEE, (2017)Should I seed or should I not: On the remuneration of seeders in D2D offloading., , and . WoWMoM, page 1-9. IEEE Computer Society, (2016)Stay at the Helm: secure Kubernetes deployments via graph generation and attack reconstruction., and . CLOUD, page 59-69. IEEE, (2022)Cross-Network Information Dissemination in Vehicular Ad hoc Networks (VANETs): Experimental Results from a Smartphone-Based Testbed., , , , and . Future Internet, 5 (3): 398-428 (2013)Statesec: Stateful monitoring for DDoS protection in software defined networks., , , , and . NetSoft, page 1-9. IEEE, (2017)Device-to-device data Offloading : from model to implementation. (Délestage de données en D2D : de la modélisation à la mise en oeuvre).. Pierre and Marie Curie University, Paris, France, (2015)Revealing the Threat Landscape of Intent-based Management in O-RAN., , , , and . ICIN, page 106-113. IEEE, (2024)Flooding data in a cell: is cellular multicast better than device-to-device communications?, , and . CHANTS@MobiCom, page 19-24. ACM, (2014)Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster., , , and . ARES, page 117:1-117:9. ACM, (2022)