From post

Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities.

, , , и . ACM Conference on Computer and Communications Security, стр. 2665-2667. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a Security-Enhanced Cloud Platform., , и . PRDC, стр. 229-230. IEEE, (2018)Probius: Automated Approach for VNF and Service Chain Analysis in Software-Defined NFV., , и . SOSR, стр. 14:1-14:13. ACM, (2018)Bridging the architectural gap between NOS design principles in software-defined networks., , , , , и . SoCC, стр. 637. ACM, (2017)Just-in-time WLANs: On-demand interference-managed WLAN infrastructures., , , , , и . INFOCOM, стр. 1-9. IEEE, (2016)Formullar: An FPGA-based network testing tool for flexible and precise measurement of ultra-low latency networking systems., , , и . Comput. Networks, (2021)FuzzDocs: An Automated Security Evaluation Framework for IoT., , , , , , и . IEEE Access, (2022)Understanding Block and Transaction Logs of Permissionless Blockchain Networks., и . Secur. Commun. Networks, (2021)Duo: Software Defined Intrusion Tolerant System Using Dual Cluster., , , , , и . Secur. Commun. Networks, (2018)Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method., , , , , и . IEICE Trans. Inf. Syst., 105-D (4): 824-827 (2022)Toward Semantic Assessment of Vulnerability Severity: A Text Mining Approach., и . CIKM Workshops, том 2482 из CEUR Workshop Proceedings, CEUR-WS.org, (2018)