default search action
BibTeX records: Hamza Attak
@inproceedings{DBLP:conf/netsoft/GardikisTTBCLGF17, author = {Georgios Gardikis and K. Tzoulas and K. Tripolitis and A. Bartzas and Socrates Costicoglou and Antonio Lioy and Bernat Gast{\'{o}}n and Carolina Fernandez and Cristian D{\'{a}}vila and Antonios Litke and Nikolaos Papadakis and Dimitris Papadopoulos and Antonio Pastor and Jer{\'{o}}nimo N{\'{u}}{\~{n}}ez and Ludovic Jacquin and Hamza Attak and N. Davri and George Xylouris and M. Kafetzakis and Dimitris Katsianis and Ioannis Neokosmidis and M. Terranova and C. Giustozzi and T. Batista and R. Preto and Eleni Trouva and Y. Angelopoulos and Akis Kourtis}, title = {{SHIELD:} {A} novel NFV-based cybersecurity framework}, booktitle = {2017 {IEEE} Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/NETSOFT.2017.8004228}, doi = {10.1109/NETSOFT.2017.8004228}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/GardikisTTBCLGF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShawA17, author = {Adrian L. Shaw and Hamza Attak}, title = {Exploring Granular flow Integrity for Interconnected Trusted Platforms}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {594--601}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.289}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.289}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShawA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/LioySSALP17, author = {Antonio Lioy and Tao Su and Adrian L. Shaw and Hamza Attak and Diego R. L{\'{o}}pez and Antonio Pastor}, editor = {Shao Ying Zhu and Sandra Scott{-}Hayward and Ludovic Jacquin and Richard Hill}, title = {Trust in {SDN/NFV} Environments}, booktitle = {Guide to Security in {SDN} and {NFV} - Challenges, Opportunities, and Applications}, series = {Computer Communications and Networks}, pages = {103--124}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64653-4\_4}, doi = {10.1007/978-3-319-64653-4\_4}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ccn/LioySSALP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/AttakMDDFGGJLLPPNT17, author = {Hamza Attak and Marco Casassa Mont and Cristian D{\'{a}}vila and Eleni{-}Constantina Davri and Carolina Fernandez and Georgios Gardikis and Bernat Gast{\'{o}}n and Ludovic Jacquin and Antonio Lioy and Antonis Litke and Nikolaos K. Papadakis and Dimitris Papadopoulos and Jer{\'{o}}nimo N{\'{u}}{\~{n}}ez and Eleni Trouva}, editor = {Shao Ying Zhu and Sandra Scott{-}Hayward and Ludovic Jacquin and Richard Hill}, title = {{SHIELD:} Securing Against Intruders and Other Threats Through an NFV-Enabled Environment}, booktitle = {Guide to Security in {SDN} and {NFV} - Challenges, Opportunities, and Applications}, series = {Computer Communications and Networks}, pages = {197--225}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64653-4\_8}, doi = {10.1007/978-3-319-64653-4\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ccn/AttakMDDFGGJLLPPNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.