Author of the publication

Understanding Security Implications of Using Containers in the Cloud.

, , , , , and . USENIX Annual Technical Conference, page 313-319. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CAP3: A Cloud Auto-Provisioning Framework for Parallel Processing Using On-Demand and Spot Instances., , , , and . IEEE CLOUD, page 228-235. IEEE, (2013)vPath: Precise Discovery of Request Processing Paths from Black-Box Observations of Thread and Network Activities., , , , , and . USENIX Annual Technical Conference, USENIX Association, (2009)Security Analysis of Container Images Using Cloud Analytics Framework., , , , and . ICWS, volume 10966 of Lecture Notes in Computer Science, page 116-133. Springer, (2018)Understanding Security Implications of Using Containers in the Cloud., , , , , and . USENIX Annual Technical Conference, page 313-319. USENIX Association, (2017)Real-time Java virtual machine for information appliances., , , and . IEEE Trans. Consumer Electronics, 46 (4): 949-957 (2000)Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G Networks., , and . ICDCS, page 413-422. IEEE Computer Society, (2011)AppCloak: Rapid Migration of Legacy Applications into Cloud., and . IEEE CLOUD, page 810-817. IEEE, (2014)Log-based Abnormal Task Detection and Root Cause Analysis for Spark., , , , , and . ICWS, page 389-396. IEEE, (2017)Mobile Web Browsing Using the Cloud., , and . Springer Briefs in Computer Science Springer, (2014)BlackEye: automatic IP blacklisting using machine learning from security logs., and . Wirel. Networks, 28 (2): 937-948 (2022)