Web Application Firewalls and Ways of Seeing Imperfect Tools (English)
- New search for: Zitek, Andrew
- New search for: Olmsted, Aspen
- New search for: Zitek, Andrew
- New search for: Olmsted, Aspen
In:
CLOUD COMPUTING 2020
; 7-13
;
2020
-
ISBN:
- Conference paper / Electronic Resource
-
Title:Web Application Firewalls and Ways of Seeing Imperfect Tools
-
Contributors:Zitek, Andrew ( author ) / Olmsted, Aspen ( author )
-
Conference:International Conference on Cloud Computing, GRIDs, and Virtualization ; 11. ; 2020 ; Nizza
-
Published in:CLOUD COMPUTING 2020 ; 7-13
-
Publisher:
- New search for: IARIA
-
Place of publication:[Wilmington, DE, USA]
-
Publication date:2020
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
- New search for: 54.84 / 54.62 / 54.32
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Secure Business Intelligence Markup Language (secBIML) for the CloudOlmsted, Aspen et al. | 2020
- 2
-
Web Application Firewalls and Ways of Seeing Imperfect ToolsZitek, Andrew / Olmsted, Aspen et al. | 2020
- 3
-
Using Bayesian Networks to Reduce SLO Violations in a Dynamic Cloud-based EnvironmentOlmsted, Aspen / Dua, Agam et al. | 2020
- 4
-
IoT Device IdentificAtion and RecoGnition (IoTAG)Hinterberger, Lukas / Fischer, Sebastian / Weber, Berhard / Neubauer, Katrin / Hackenberg, Rudolf et al. | 2020
- 5
-
A Study About the Different Categories of IoT in Scientific PublicationsFischer, Sebastian / Neubauer, Katrin / Hackenberg, Rudolf et al. | 2020
- 6
-
Threat Analysis of Industrial Internet of Things DevicesLiebl, Simon / Lathrop, Leah / Raithel, Ulrich / Sollner, Matthias / Assmuth, Andreas et al. | 2020
- 7
-
Development of a Process-oriented Framework for Security Assessment of Cyber Physical SystemsNeubauer, Katrin / Hackenberg, Rudolf et al. | 2020
- 8
-
Securing the Internet of Things from the Bottom Up Using Physical Unclonable FunctionsLathrop, Leah / Liebl, Simon / Raithel, Ulrich / Sollner, Matthias / Assmuth, Andreas et al. | 2020
- 9
-
An IoT Crypto Gateway for Resource-Constrained IoT DevicesAlqattaa, Ahmed / Loebenberger, Daniel et al. | 2020
- 10
-
Reliable Fleet Analytics for Edge IoT SolutionsRaj, Emmanuel / Westerlund, Magnus / Espinosa-Leal, Leonardo et al. | 2020
- 11
-
Securing the Internet of Things from the Bottom Up Using an Immutable Blockchain-Based Secure Forensic TrailDuncan, Bob et al. | 2020
- 12
-
A Systematic Mapping Study on Edge Computing and AnalyticsMorariu, Andrei / Shabulinzenze, Jonathan / Jaurola, Miikka / Multanen, Petteri / Huhtala, Kalevi / Bjorkqvist, Jerker / Nybom, Kristian et al. | 2020
- 13
-
Migration of Data and Applications in the CloudKaciu, Arian / Jajaga, Edmond et al. | 2020
- 15
-
System Operator: A Tool for System Management in Kubernetes ClustersYu, Jiye / Naganuma, Yuki / Ide, Takaya et al. | 2020