1 – 20 of 34
- show: 20
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
Access Security Policy Generation for Containers as a Cloud Service
(
- Contribution to journal › Article
- 2022
-
Mark
RoSym: Robust Symmetric Key Based IoT Software Upgrade Over-the-Air
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Kub-Sec, an automatic Kubernetes cluster AppArmor profile generation engine
2022) 14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022 In International Conference on Communication Systems and Networks p.129-137(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure Ownership Transfer for Resource Constrained IoT Infrastructures
2022) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 In Communications in Computer and Information Science 1545 CCIS. p.22-47(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Insight of Anomaly Detection with NWDAF in 5G
2022) 2022 International Conference on Computer, Information and Telecommunication Systems (CITS)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2021
-
Mark
A Decentralized Dynamic PKI based on Blockchain
2021) The 36th ACM/SIGAPP Symposium on Applied Computing, SAC '21(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
AppArmor Profile Generator as a Cloud Service
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Lic-Sec: An enhanced AppArmor Docker security profile generator
(
- Contribution to journal › Article
-
Mark
Prototyping intrusion detection in an industrial cloud-native digital twin
2021) 2021 22nd IEEE International Conference on Industrial Technology (ICIT)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Demonstration : A cloud-native digital twin with adaptive cloud-based control and intrusion detection
(
- Contribution to journal › Article
-
Mark
X-Pro : Distributed XDP Proxies Against Botnets of Things
2021) 26th Nordic Conference on Secure IT Systems, NordSec 2021 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13115 LNCS. p.51-71(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2020
-
Mark
A Digital Twin Based Industrial Automation and Control System Security Architecture
(
- Contribution to journal › Article
-
Mark
Secure ownership transfer for the Internet of Things
2020) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 1. p.33-44(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
CLI-DOS : Collaborative Counteraction against Denial of Service in the Internet of Things
2020) 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2020(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
Metadata filtering for user-friendly centralized biometric authentication
(
- Contribution to journal › Article
-
Mark
SDN Access Control for the Masses
(
- Contribution to journal › Article
-
Mark
An Identity Privacy Preserving IoT Data Protection Scheme for Cloud Based Analytics
2019) 2019 IEEE International Conference on Big Data, Big Data 2019 In Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019 p.5744-5753(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2018
-
Mark
Practical Attacks on Relational Databases Protected via Searchable Encryption
2018) 21st Information Security Conference, ISC 2018 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11060 LNCS. p.171-191(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
Searchable Encrypted Relational Databases: Risks and Countermeasures
(
- Contribution to specialist publication or newspaper › Specialist publication article
-
Mark
A secure group-based AKA protocol for machine-type communications
2017) 19th International Conference on Information Security and Cryptology, ICISC 2016 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10157 LNCS. p.3-27(
- Chapter in Book/Report/Conference proceeding › Book chapter