Author:
Budigiri Gerald,Baumann Christoph,Muhlberg Jan Tobias,Truyen Eddy,Joosen Wouter
Funder
Research Fund KU Leuven
Flemish Research Programme Cyberse-curity
EU H2020 MSCA-ITN action 5GhOSTS
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancing IoT device security in Kubernetes: An approach adopted for network policies and the SARIK framework;Future Generation Computer Systems;2025-01
2. HardWhale: A Hardware-Isolated Network Security Enforcement System for Cloud Environments;2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS);2024-07-23
3. NPV: Fast Network Policy Verification for Cloud-Native Networking;2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS);2024-07-23
4. Towards Intent-Based Scheduling for Performance and Security in Edge-to-Cloud Networks;2024 27th Conference on Innovation in Clouds, Internet and Networks (ICIN);2024-03-11
5. Secure and Scalable Policy Management in Cloud Native Networking;Proceedings of the 24th International Middleware Conference: Demos, Posters and Doctoral Symposium;2023-12-11