共 46 条
[1]
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)
[J].
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIV, DBSEC 2020,
2020, 12122
:3-23
[2]
Amvrosiadis G, 2018, PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, P533
[3]
[Anonymous], INT C LEARNING REPRE
[4]
Determinating Timing Channels in Compute Clouds
[J].
PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:),
2010,
:103-108
[5]
Barham P., 2003, Operating Systems Review, V37, P164, DOI 10.1145/1165389.945462
[6]
Bergstra J, 2012, J MACH LEARN RES, V13, P281
[7]
Bijon Khalid., 2015, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, P183, DOI DOI 10.1145/2699026.2699112
[8]
Bijon Khalid., 2015, 20th Symposium on Access Control Models and Technologies, P63, DOI DOI 10.1145/2752952.2752964
[9]
Bijon KZ, 2014, LECT NOTES COMPUT SC, V8792, P41, DOI 10.1007/978-3-319-11698-3_4
[10]
Boyle Tara., Dealing with imbalanced data