Zero Trust Container Architecture (ZTCA): A Framework for Applying Zero Trust Principals to Docker Containers

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Cyber Warfare and Security (17. : 2022 : Albany, NY; Online) 17th International Conference on Cyber Warfare and Security (ICCWS 2021)
1. Verfasser: Leahy, Darragh (VerfasserIn)
Weitere Verfasser: Thorpe, Christina (VerfasserIn)
Pages:17
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Cyberbullying Indicator as a Precurson to a Cyber Construct Development 2022 Al-Romaihi, Salam Khalifa
Education and Training Against Threat of Phishing Emails 2022 Burita, Ladislav
Design and Evaluation of a Cyber Protection Team Planner Work Aid 2022 Liggett, Kristen
On Explainable Al Solutions for Targeting in Cyber Military Operations 2022 Maathuis, Clara
I Know You by Heart: Biometric Authentication based on Electrocardiogram (ECG) signals 2022 Lipps, Christoph
Specialised Media Monitoring Tool to Observe Situational Awareness 2022 Pieterse, Heloise
Aligning South African Data and Cloud Policy with the PoPI Act 2022 Raaff, Emma
Utilizing Switch Port Link State to Detect Rogue Switches 2022 Quitiquit, Travis
Bug Bounties: Between New Regulations and Geopolitical Dynamics 2022 Silomon, Jantje
The Cumulative Cyber Deterrence 2022 Turunen, Maija
Ransomware Detection using Process Memory 2022 Singh, Avinash
Evaluating the Reliability of Android Userland and Memory Forensics 2022 Sudhakaran, Sneha
Defending Small Satellites from Malicious Cybersecurity Threats 2022 Lin, Banks
Analysis of Sexual Abuse of Children Online and CAM Investigations in Finland 2022 Paraviainen, Johanna
Addressing the Skills Shortage in Cybersecurity 2022 Davies, Gareth
The Failure of Trust in Trusted Systems 2022 Mison, Angela
Cyberwarfare and its Effects on Critical Infrastructure 2022 Bhaiyat, Humairaa Yacoob
Can Attrition Theory Provide Insight for Cyber Warfare? 2022 Defibaugh, Stephen
Shallow Deep Learning using Space-filling Curves for Malware Classification 2022 Long, David
Analyzing the Performance of Block-Splitting in LVM Fingerprinting 2022 Mahoney, William
Alle Artikel auflisten