Leveraging in-network real-value computation for home network device recognition | 0 | 0.34 | 2021 |
Bmc: Accelerating Memcached Using Safe In-Kernel Caching And Pre-Stack Processing | 0 | 0.34 | 2021 |
InREC: In-network REal Number Computation | 0 | 0.34 | 2021 |
Toward an in-Kernel High Performance Key-Value Store Implementation | 0 | 0.34 | 2019 |
Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned. | 11 | 0.64 | 2018 |
Oko: Extending Open vSwitch with Stateful Filters | 7 | 0.55 | 2018 |
Offloading Security Services to the Cloud Infrastructure. | 0 | 0.34 | 2018 |
Towards Black-Box Anomaly Detection in Virtual Network Functions | 2 | 0.45 | 2016 |
AMAD: Resource Consumption Profile-Aware Attack Detection in IaaS Cloud | 1 | 0.34 | 2014 |
Engineering Intrusion Prevention Services for IaaS Clouds: The Way of the Hypervisor | 3 | 0.40 | 2013 |
When Dynamic VM Migration Falls under the Control of VM Users | 6 | 0.43 | 2013 |
Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms. | 5 | 0.42 | 2013 |