Computer security paper
Paper list
Paper list
278
ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV)
Network
Network functions virtualization
NFV
290
EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation
Network
Obfuscation
LFAs
SDN
488
A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks
Cellular Networks
LTE
5G
Location identification
599
GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference
GPU
ML
Neural Network