Author:
Carroll Thomas E.,Crouse Michael,Fulp Errin W.,Berenhaut Kenneth S.
Cited by
69 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
2. Probabilistic models for evaluating network edge's resistance against scan and foothold attack;IET Communications;2024-04-23
3. An Active Security Defense Strategy for Microservices based on Deep Reinforcement Learning;2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2023-12-21
4. PT-SSIM: A Proactive, Trustworthy Self-Sovereign Identity Management System;IEEE Internet of Things Journal;2023-10-01
5. ITC: Intrusion tolerant controller for multicontroller SDN architecture;Computers & Security;2023-09