Author of the publication

HoneyChart: Automated Honeypot Management over Kubernetes.

, , , , , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 321-328. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PRIMA: An End-to-End Framework for Privacy at Scale., , , , and . ICDE, page 1531-1542. IEEE Computer Society, (2018)FPVI: A scalable method for discovering privacy vulnerabilities in microdata., , and . ISC2, page 1-8. IEEE, (2016)Traffic Measurement and Route Recommendation System for Mass Rapid Transit (MRT)., , , , , , , and . KDD, page 1859-1868. ACM, (2015)Defending against known and unknown attacks using a network of affined honeypots. University of Crete, Greece, (2009)National Archive of PhD Theses: oai:10442/18045.HoneyChart: Automated Honeypot Management over Kubernetes., , , , , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 321-328. Springer, (2022)PrivLeAD: Privacy Leakage Detection on the Web., , , and . IntelliSys (1), volume 1250 of Advances in Intelligent Systems and Computing, page 428-439. Springer, (2020)An Extensible De-Identification Framework for Privacy Protection of Unstructured Health Information: Creating Sustainable Privacy Infrastructures., , , and . MedInfo, volume 264 of Studies in Health Technology and Informatics, page 1140-1144. IOS Press, (2019)Home and Work Place Prediction for Urban Planning Using Mobile Network Data., , , , , , , , , and 2 other author(s). MDM (2), page 37-42. IEEE Computer Society, (2014)978-1-4799-5705-7.Oscillation Resolution for Mobile Phone Cellular Tower Data to Enable Mobility Modelling., , , , , , , , , and 2 other author(s). MDM (1), page 321-328. IEEE Computer Society, (2014)Secure k-Anonymization over Encrypted Databases., , , , and . CLOUD, page 20-30. IEEE, (2021)