Towards Traffic-Driven VNF Scaling: A Preliminary Case Study based on Container
Guest Editorial: Managing Insider Security Threats
Device Identification and Personal Data Attestation in Networks
On the impossibility of effectively using likely-invariants for software attestation purposes
Stopping the Insider at the Gates: Protecting Organizational Assets Through Graph Mining
Estimation of Signal Coverage and Localization in Wi-Fi Networkswith AODV and OLSR
Situational Awareness Framework for Threat Intelligence Measurement of Android Malware
A Belief Rule Based Expert System to Predict Earthquake under Uncertainty
Subliminal Channels in High-Speed Signatures