Author of the publication

Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service.

, , , , , and . ARES, page 47:1-47:8. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling secure multitenancy in cloud computing: Challenges and approaches., , , , , and . BCFIC, page 72-79. IEEE, (2012)Solving security constraints for 5G slice embedding: A proof-of-concept., , , , , and . Comput. Secur., (2020)ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks., , and . CCS, page 3662-3663. ACM, (2023)Designing Security-Aware Service Requests for NFV-Enabled Networks., and . ICCCN, page 1-9. IEEE, (2019)Siamese Network Based Feature Learning for Improved Intrusion Detection., , , and . ICONIP (1), volume 11953 of Lecture Notes in Computer Science, page 377-389. Springer, (2019)XAI-driven Adversarial Attacks on Network Intrusion Detectors., , , , , , , and . EICC, page 65-73. ACM, (2024)EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits., , , , and . BADGERS@ESORICS, page 56-65. IEEE, (2014)Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification., , and . ICONIP (3), volume 9491 of Lecture Notes in Computer Science, page 223-232. Springer, (2015)Automated Saturation Mitigation Controlled by Deep Reinforcement Learning., , , and . ICNP, page 1-6. IEEE, (2020)Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware Detection., , and . NTMS, page 1-6. IEEE, (2011)