共 50 条
- [31] A Model for the Analysis of Security Policies in Service Function Chains 2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT), 2017,
- [32] Network Policies in Kubernetes: Performance Evaluation and Security Analysis 2021 JOINT EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS & 6G SUMMIT (EUCNC/6G SUMMIT), 2021, : 407 - 412
- [34] Compositional Taint Analysis for Enforcing Security Policies at Scale PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 1985 - 1996
- [35] Structural Model for the Analysis and Construction of Security and Defense Policies URVIO-REVISTA LATINOAMERICANA DE ESTUDIOS DE SEGURIDAD, 2022, (32): : 112 - 126
- [36] Security policies against gangs and economic analysis of the law POLICIA Y SEGURIDAD PUBLICA, 2016, 6 (01): : 317 - 325
- [37] Semantically Rich Application-Centric Security in Android 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 340 - 349
- [39] LEARNING SOUND LOCALIZATION BETTER FROM SEMANTICALLY SIMILAR SAMPLES 2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 4863 - 4867
- [40] Automated generation of enforcement mechanisms for semantically-rich security policies in Java']Java-based multi-agent systems 2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY, 2004, : 11 - 20