Programmable data planes offer precise control over the low-level proces...
Cyber deception can be a valuable addition to traditional cyber defense
...
Federated Learning (FL) has been recently receiving increasing considera...
Machine Learning (ML) has proven to be effective in many application dom...
Nowadays IoT applications consist of a collection of loosely coupled mod...
Volumetric distributed Denial-of-Service (DDoS) attacks have become one ...
Distributed Denial-of-Service (DDoS) attacks represent a persistent thre...
Deep Learning is emerging as an effective technique to detect sophistica...
Distributed Denial of Service (DDoS) attacks are one of the most harmful...
A promising area of application for Network Function Virtualization is i...
Fog computing extends cloud computing technology to the edge of the
infr...
Growing traffic demands and increasing security awareness are driving th...
In this work we demonstrate an automatic intent-based encryption layer
s...
We demonstrate multi-layer encrypted service provisioning via the ACINO
...