BibTeX records: Hamza Attak

download as .bib file

@inproceedings{DBLP:conf/netsoft/GardikisTTBCLGF17,
  author       = {Georgios Gardikis and
                  K. Tzoulas and
                  K. Tripolitis and
                  A. Bartzas and
                  Socrates Costicoglou and
                  Antonio Lioy and
                  Bernat Gast{\'{o}}n and
                  Carolina Fernandez and
                  Cristian D{\'{a}}vila and
                  Antonios Litke and
                  Nikolaos Papadakis and
                  Dimitris Papadopoulos and
                  Antonio Pastor and
                  Jer{\'{o}}nimo N{\'{u}}{\~{n}}ez and
                  Ludovic Jacquin and
                  Hamza Attak and
                  N. Davri and
                  George Xylouris and
                  M. Kafetzakis and
                  Dimitris Katsianis and
                  Ioannis Neokosmidis and
                  M. Terranova and
                  C. Giustozzi and
                  T. Batista and
                  R. Preto and
                  Eleni Trouva and
                  Y. Angelopoulos and
                  Akis Kourtis},
  title        = {{SHIELD:} {A} novel NFV-based cybersecurity framework},
  booktitle    = {2017 {IEEE} Conference on Network Softwarization, NetSoft 2017, Bologna,
                  Italy, July 3-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/NETSOFT.2017.8004228},
  doi          = {10.1109/NETSOFT.2017.8004228},
  timestamp    = {Thu, 05 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/GardikisTTBCLGF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShawA17,
  author       = {Adrian L. Shaw and
                  Hamza Attak},
  title        = {Exploring Granular flow Integrity for Interconnected Trusted Platforms},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {594--601},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.289},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.289},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShawA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/LioySSALP17,
  author       = {Antonio Lioy and
                  Tao Su and
                  Adrian L. Shaw and
                  Hamza Attak and
                  Diego R. L{\'{o}}pez and
                  Antonio Pastor},
  editor       = {Shao Ying Zhu and
                  Sandra Scott{-}Hayward and
                  Ludovic Jacquin and
                  Richard Hill},
  title        = {Trust in {SDN/NFV} Environments},
  booktitle    = {Guide to Security in {SDN} and {NFV} - Challenges, Opportunities,
                  and Applications},
  series       = {Computer Communications and Networks},
  pages        = {103--124},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64653-4\_4},
  doi          = {10.1007/978-3-319-64653-4\_4},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ccn/LioySSALP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/AttakMDDFGGJLLPPNT17,
  author       = {Hamza Attak and
                  Marco Casassa Mont and
                  Cristian D{\'{a}}vila and
                  Eleni{-}Constantina Davri and
                  Carolina Fernandez and
                  Georgios Gardikis and
                  Bernat Gast{\'{o}}n and
                  Ludovic Jacquin and
                  Antonio Lioy and
                  Antonis Litke and
                  Nikolaos K. Papadakis and
                  Dimitris Papadopoulos and
                  Jer{\'{o}}nimo N{\'{u}}{\~{n}}ez and
                  Eleni Trouva},
  editor       = {Shao Ying Zhu and
                  Sandra Scott{-}Hayward and
                  Ludovic Jacquin and
                  Richard Hill},
  title        = {{SHIELD:} Securing Against Intruders and Other Threats Through an
                  NFV-Enabled Environment},
  booktitle    = {Guide to Security in {SDN} and {NFV} - Challenges, Opportunities,
                  and Applications},
  series       = {Computer Communications and Networks},
  pages        = {197--225},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64653-4\_8},
  doi          = {10.1007/978-3-319-64653-4\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ccn/AttakMDDFGGJLLPPNT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}