Udaya Tupakula

Dr

  • 564 Citations
  • 12 h-Index
20022019
If you made any changes in Pure these will be visible here soon.

Research Outputs 2002 2019

  • 564 Citations
  • 12 h-Index
  • 59 Conference proceeding contribution
  • 16 Article
  • 4 Chapter
  • 1 Conference paper
2019

A policy based security architecture for software-defined networks

Varadharajan, V., Karmakar, K., Tupakula, U. & Hitchens, M., Apr 2019, In : IEEE Transactions on Information Forensics and Security. 14, 4, p. 897-912 16 p., 8453023.

Research output: Contribution to journalArticleResearchpeer-review

Switches
Controllers
Network security
Communication
Specifications
2018

Securing services in networked cloud infrastructures

Varadharajan, V. & Tupakula, U., 1 Oct 2018, In : IEEE Transactions on Cloud Computing. 6, 4, p. 1149-1163 15 p., 7473937.

Research output: Contribution to journalArticleResearchpeer-review

Restoration
Virtual machine
Servers
Communication
2017

An Eclat algorithm based energy detection for cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., 7 Sep 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems: Trustcom/BigDataSE/ICESS 2017. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1096-1102 7 p. 8029561

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cognitive radio
Fusion reactions
Decision making
Energy
Attack

A trust model based energy detection for cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., 30 Jan 2017, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2017. New York: Association for Computing Machinery, p. 1-8 8 p. 68

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cognitive radio

Autoencoder-based feature learning for cyber security applications

Yousefiazar, M., Varadharajan, V., Hamey, L. & Tupakula, U., 30 Jun 2017, International Joint Conference on Neural Networks. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 3854-3861 8 p. 7966342

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Semantics
Classifiers
Data storage equipment
Malware

Efficient approaches for intrusion detection in cloud environment

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 10 Jan 2017, Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016. Astya, P. N., Swaroop, A., Sharma, V. & Singh, M. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 1211-1216 6 p. 7813926

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Intrusion Detection
Computer worms
Computer viruses
Learning systems

Intrusion detection techniques in cloud environment: a survey

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 1 Jan 2017, In : Journal of Network and Computer Applications. 77, p. 18-47 30 p.

Research output: Contribution to journalArticleResearchpeer-review

Intrusion detection
Taxonomies
Cloud computing
Computer hardware
Virtual machine

Mitigating attacks in Software Defined Network (SDN)

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 5 Jun 2017, SDS 2017: Fourth International Conference on Software Defined Systems. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 112-117 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Communication
Attack
Software
Open source software

On the design and implementation of an integrated security architecture for cloud with improved resilience

Varadharajan, V. & Tupakula, U., 1 Jul 2017, In : IEEE Transactions on Cloud Computing. 5, 3, p. 375-389 15 p., 7420656.

Research output: Contribution to journalArticleResearchpeer-review

Intrusion detection
Access control
Servers
Life cycle
Feedback

Out-VM monitoring for Malicious Network Packet Detection in cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 12 Jul 2017, ISEASP 2017: Proceedings of the 2017 ISEA Asia Security and Privacy Conference. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Packet networks
Monitoring
Servers
Feature extraction
Virtual machine

PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 2017, In : Journal of Intelligent and Fuzzy Systems. 32, 4, p. 2909-2921 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Virtual Machine
Intrusion detection
Intrusion Detection
Semantics
Attack

Secure monitoring of the patients with wandering behaviour

Tupakula, U., Varadharajan, V. & Karmakar, K., 24 Apr 2017, 11th International Conference on Body Area Networks: BODYNETS 2016. Red Hook, NY: ACM, p. 111-117 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Monitoring
Controllers
Wireless local area networks (WLAN)
Health care
Local area networks

Securing communication in multiple Autonomous System domains with Software Defined Networking

Varadharajan, V., Karmakar, K. K. & Tupakula, U., 20 Jul 2017, Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 195-203 9 p. 7987280

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Communication
Telecommunication networks
Specifications
Controllers
Software defined networking

VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 25 Jun 2017, In : Concurrency Computation. 29, 12, p. 1-21 21 p., e4133.

Research output: Contribution to journalArticleResearchpeer-review

Malware
Infrastructure
Virtualization
Computer monitors
Dependency Graph
2016

Integrated security for services hosted in virtual environments

Jayarathna, D., Varadharajan, V. & Tupakula, U., 2016, IEEE TrustCom/BigDataSE/ISPA 2016: Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 82-89 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Access control
Virtual reality

NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment

Mishra, P., Pilli, E. S., Varadharajant, V. & Tupakula, U., 2 Nov 2016, 2016 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2016. Wu, J., Martinez Perez, G., Thampi, S. M., Atiquzzaman, M., Berretti, S., Rodrigues, J. J. C. P., Tomar, R., Gorthi, R. P., Siarry, P., Khan Pathan, A-S., Li, J., Bedi, P., Mehta, S., Kammoun, M. H. & Jain, V. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 56-62 7 p. 7732025

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cloud computing
Servers
Learning systems
Data storage equipment
Virtual machine

On the design and implementation of a security architecture for end to end services in software defined networks

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 22 Dec 2016, LCN 2016 : IEEE 41st Conference On Local Computer Networks: proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 519-522 4 p. 7796830

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Communication
Software defined networking

On the design and implementation of a security architecture for Software Defined Networks

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 2016, HPCC/SmartCity/DSS 2016: Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications, 14th IEEE International Conference on Smart City and 2nd IEEE International Conference on Data Science and Systems. Chen, J. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 671-678 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Switches
Communication

Policy based security architecture for software defined networks

Karmakar, K. K., Varadharajan, V., Tupakula, U. & Hitchens, M., 4 Apr 2016, 2016 Symposium on Applied Computing, SAC 2016. New York, USA: Association for Computing Machinery, Vol. 04-08-April-2016. p. 658-663 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Switches
Communication

Securing Big Data Environments from Attacks

Tupakula, U. & Varadharajan, V., 30 Jun 2016, Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016. Qiu, M. (ed.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 109-112 4 p. 7502273

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Monitoring
Big data
Virtual machine
Botnet
Data sources

Securing virtual machines from anomalies using program-behavior analysis in cloud environment

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 2016, HPCC/SmartCity/DSS 2016: Proceedings of the Eighteenth IEEE International Conference on High Performance Computing and Communications, the Fourteenth IEEE International Conference on Smart City, the Second IEEE International Conference on Data Science and Systems. Chen, J. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 991-998 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer worms
Computer viruses
Cloud computing
Decision trees
Learning systems
2015

An enhanced model for network flow based botnet detection

Wijesinghe, U., Tupakula, U. & Varadharajan, V., 2015, Proceedings of the 38th Australasian Computer Science Conference, ACSC 2015. Parry, D. (ed.). Sydney: Australian Computer Society, Vol. 159. p. 101-110 10 p. (Conferences in Research and Practice in Information Technology; vol. 159).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

HTTP
Botnet
Specifications
Network protocols

Botnet detection using software defined networking

Wijesinghe, U., Tupakula, U. & Varadharajan, V., 16 Jun 2015, 2015 22nd International Conference on Telecommunications, ICT 2015. New York, NY: Institute of Electrical and Electronics Engineers (IEEE), p. 219-224 6 p. 7124686

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

networking
HTTP
Controllers
Network management
Computer networks

Hypervisor-based security architecture to protect web applications

Jayarathna, D., Tupakula, U. & Varadharajan, V., 2015, Proceedings of the 13th Australasian Information Security Conference, AISC 2015. Ian, W. & Yi, X. (eds.). Sydney: Australian Computer Society, Vol. 161. p. 15-24 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Web browsers
Visibility
World Wide Web
Websites
Virtual machine

Improved detection of primary user emulation attacks in cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., Nov 2015, 25th International Telecommunication Networks and Applications Conference, ITNAC 2015. Piscataway, N.J.: Institute of Electrical and Electronics Engineers (IEEE), p. 274-279 6 p. 7366825

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cognitive radio
Mobile devices
Electron energy levels
Communication

Securing wireless mobile nodes from distributed denial-of-service attacks

Varadharajan, V. & Tupakula, U., 1 Oct 2015, In : Concurrency Computation. 27, 15, p. 3794-3815 22 p.

Research output: Contribution to journalArticleResearchpeer-review

Denial of Service
Mobile devices
Attack
Vertex of a graph
Mobile Devices

Trust Enhanced Security for Tenant Transactions in the Cloud Environment

Tupakula, U. & Varadharajan, V., Oct 2015, In : Computer Journal. 58, 10, p. 2388-2403 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Cloud computing
Trusted computing
2014

Antivirus security: Naked during updates

Min, B., Varadharajan, V., Tupakula, U. & Hitchens, M., 2014, In : Software - Practice and Experience. 44, 10, p. 1201-1222 22 p.

Research output: Contribution to journalArticleResearchpeer-review

Computer systems
Malware

Counteracting security attacks in virtual machines in the cloud using property based attestation

Varadharajan, V. & Tupakula, U., 2014, In : Journal of Network and Computer Applications. 40, p. 31-45 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Cloud computing
Virtual machine
Mobile phones
Hardware
Hardware security

Hypervisor-based security architecture for validating DNS services (Poster)

Jayarathna, D., Tupakula, U. & Varadharajan, V., 2014, Information Security 2014 - Proceedings of the Twelfth Australasian Information Security Conference, AISC 2014. Parampalli, U. & Welch, I. (eds.). Sydney, Australia: Australian Computer Society, Vol. 149. p. 83-86 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer monitors
Monitoring
Visibility
Internet
Network protocols

Secure monitoring for dementia patients

Tupakula, U. & Varadharajan, V., 2014, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC 2014. New York: Association for Computing Machinery, p. 14-19 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Nursing
Monitoring
Costs

Security as a service model for cloud environment

Varadharajan, V. & Tupakula, U., 2014, In : IEEE Transactions on Network and Service Management. 11, 1, p. 60-75 16 p., 6805344.

Research output: Contribution to journalArticleResearchpeer-review

Cloud computing
Internet

Techniques for detecting attacks on critical infrastructure

Tupakula, U. & Varadharajan, V., 2014, 2014 International Conference on Computing, Networking and Communications, ICNC 2014. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 48-52 5 p. 6785303

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Critical infrastructures
Hardware
Communication

Trust enhanced cloud security for healthcare services

Tupakula, U. & Varadharajan, V., 2014, Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 344-351 8 p. 7011269

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

2013

Integrated Security Architecture for Virtual Machines

Varadharajan, V. & Tupakula, U., 2013, Security and privacy in communication networks: 9th International ICST Conference, SecureComm 2013 Sydney, NSW Australia, September 2013 Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Cham: Springer, Springer Nature, p. 140-153 14 p. (Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering; vol. 127).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

On malware characterization and attack classification

Lee, A., Varadharajan, V. & Tupakula, U., 2013, Proceedings of the First Australasian Web Conference (AWC 2013). Ashman, H., Sheng, Q. Z. & Trotman, A. (eds.). Sydney: Australian Computer Society, p. 43-48 6 p. (Conferences in Research and Practice in Information Technology (CRPIT); vol. 144).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Taxonomies
Polymorphism
Internet
Malware

On the security of tenant transactions in the cloud

Varadharajan, V. & Tupakula, U., 2013, Proceedings: IEEE Fifth International Conference on Cloud Computing Technology and Science. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 525-530 6 p. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cloud computing
Transactions
Cloud Computing
Infrastructure
Attack

Securing mobile devices from DoS attacks

Tupakula, U. & Varadharajan, V., 2013, Proceedings - 16th IEEE International Conference on Computational Science and Engineering, CSE 2013. Chen, J., Cuzzocrea, A. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical Engineers, p. 34-41 8 p. 6755194

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Mobile devices
Speech communication
Denial-of-service attack

Security techniques for counteracting attacks in mobile healthcare services

Tupakula, U. & Varadharajan, V., 2013, In : Procedia Computer Science. 21, p. 374-381 8 p.

Research output: Contribution to journalConference paperResearchpeer-review

Mobile devices
Health
Internet
Communication
mHealth

Trust enhanced security architecture for detecting insider threats

Tupakula, U. & Varadharajan, V., 2013, Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13, 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, 16-18 July 2013, Melbourne, Victoria, Australia. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 552-559 8 p. 6680886

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Monitoring
Trusted computing
2012

Distributed service control technique for detecting security attacks

Tupakula, U. & Varadharajan, V., 2012, Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012. De Turck, F., Gaspary, L. P. & Medhi, D. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 574-577 4 p. 6211959

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Attack
Service control
Security policy

Dynamic state-based security architecture for detecting security attacks in virtual machines

Tupakula, U. K. & Varadharajan, V., Apr 2012, In : Computer Journal. 55, 4, p. 397-409 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Intrusion detection
Computer operating systems
Computer monitors
Virtual machine
Computer systems

Intrusion detection techniques for virtual domains

Tupakula, U., Varadharajan, V. & Dutta, D., 2012, 2012 19th International Conference on High Performance Computing, HiPC 2012. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-9 9 p. 6507491

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Computer operating systems
Virtual machine

TREASURE: trust enhanced security for cloud environments

Varadharajan, V. & Tupakula, U., 2012, Proceedings: the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2012): 25-27 June 2012, Liverpool, UK. Min, G., Wu, Y., Liu, L. C., Jin, X., Jarvis, S. & Al-Dubai, A. Y. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 145-152 8 p. 6295969

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Virtual machine
Cloud computing
Hardware
2011

Counteracting DDoS attacks in WLAN

Tupakula, U., Varadharajan, V. & Vuppala, S. K., 2011, Proceedings of the 4th International Conference on Security of Information and Networks. New York: Association for Computing Machinery, p. 119-126 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Wireless local area networks (WLAN)
Network protocols
Network architecture
Wireless networks
Denial-of-service attack

Intrusion detection techniques for infrastructure as a service cloud

Tupakula, U., Varadharajan, V. & Akku, N., 2011, Proceedings - IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, DASC 2011. Chen, J., Dou, W., Liu, J., Yang, L. T. & Ma, J. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 744-751 8 p. 6118908

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Cloud computing
Virtual machine

On the design of virtual machine intrusion detection system

Tupakula, U. & Varadharajan, V., 2011, Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, IM 2011. Los Alamitos, Calif.: Institute of Electrical and Electronics Engineers (IEEE), p. 682-685 4 p. 5990655

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Computer operating systems
Engines
Virtual machine
Monitoring

Security architecture for virtual machines

Tupakula, U., Varadharajan, V. & Bichhawat, A., 2011, Algorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP 2011, Proceedings, Part 1. Xiang, Y., Cuzzocrea, A., Hobbs, M. & Zhou, W. (eds.). Heidelberg, Germany: Springer, Springer Nature, Vol. 7016 LNCS. p. 218-229 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7016 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Virtual Machine
Attack
Monitor
Traffic
Computer monitors

Security techniques for beyond 3G wireless mobile networks

Tupakula, U., Varadharajan, V. & Vuppala, S. K., 2011, Proceedings - 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing, EUC 2011. Los Alamitos, Calif.: Institute of Electrical and Electronics Engineers (IEEE), p. 136-143 8 p. 6104518

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Wireless networks
Network architecture
Mobile devices
Internet
Monitoring

Security techniques for zero day attacks

Tupakula, U. & Varadharajan, V., 2011, IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 442-447 6 p. 5982574

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer operating systems
Intrusion detection
traffic
Engines
Monitoring