1 – 9 of 9
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
A Comprehensive Robustness Analysis of Storj DCS Under Coordinated DDoS Attack
2023) 2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS) p.659-666(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2022
-
Mark
Kub-Sec, an automatic Kubernetes cluster AppArmor profile generation engine
2022) 14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022 In International Conference on Communication Systems and Networks p.129-137(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2021
-
Mark
X-Pro : Distributed XDP Proxies Against Botnets of Things
2021) 26th Nordic Conference on Secure IT Systems, NordSec 2021 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13115 LNCS. p.51-71(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2020
-
Mark
A Digital Twin Based Industrial Automation and Control System Security Architecture
(
- Contribution to journal › Article
-
Mark
CLI-DOS : Collaborative Counteraction against Denial of Service in the Internet of Things
2020) 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2020(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
SDN Access Control for the Masses
(
- Contribution to journal › Article
- 2017
-
Mark
IoT protection through device to cloud synchronization
2017) 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016 p.527-532(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Providing User Security Guarantees in Public Infrastructure Clouds
(
- Contribution to journal › Article
-
Mark
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake
(
- Contribution to journal › Article