Cited By
View all- Meng YKe CHuang Z(2024)A Model Transformation based Security Policy Automatic Management Framework for Software-defined NetworkingComputers & Security10.1016/j.cose.2024.103850(103850)Online publication date: Apr-2024
- Shen BShan TZhou YCalandrino JTroncoso C(2023)MultiviewProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620657(7499-7516)Online publication date: 9-Aug-2023
- Shen BShan TZhou YCalandrino JTroncoso C(2023)Improving logging to reduce permission over-granting mistakesProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620261(409-426)Online publication date: 9-Aug-2023
- Show More Cited By