Cited By
View all- Katsis CBertino E(2025)ZT-SDN: An ML-Powered Zero-Trust Architecture for Software-Defined NetworksACM Transactions on Privacy and Security10.1145/371226228:2(1-35)Online publication date: 15-Jan-2025
- Syrotynskyi RTyshyk I(2024)IMPROVEMENT THE SECURITY OF THE ENTERPRISE’S NETWORK INFRASTRUCTURE IN CONDITIONS OF MODERN CHALLENGES AND LIMITED RESOURCESComputer systems and network10.23939/csn2024.01.1556:1(155-164)Online publication date: Jun-2024
- Weintraub BKim JTao RNita-Rotaru COkhravi HTian DUjcich BLuo BLiao XXu JKirda ELie D(2024)Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based NetworkingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670301(3630-3644)Online publication date: 2-Dec-2024
- Show More Cited By