application threat modeling and automated vnf selection

Post on 17-Feb-2022

6 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Institute of Architecture of Application Systems, University of Stuttgart, Germany

{saatkamp, krieger, leymann, sudendorf, wurster}@iaas.uni-stuttgart.de

Application Threat Modeling and Automated VNF Selection for Mitigation using TOSCA

Karoline Saatkamp, Christoph Krieger, Frank Leymann, Julian Sudendorf, Michael Wurster

© 2019 IEEE Computer Society. Personal use of this material ispermitted. However, permission to reprint/republish this material foradvertising or promotional purposes or for creating new collective worksfor resale or redistribution to servers or lists, or to reuse any copyrightedcomponent of this work in other works must be obtained from the IEEE.

@inproceedings{Saatkamp2019_ThreatMitigationTOSCA,author = {Karoline Saatkamp and Christoph Krieger and Frank Leymann and

Julian Sudendorf and Michael Wurster},title = {Application Threat Modeling and Automated VNF Selection for

Mitigation using TOSCA},booktitle = {2019 International Conference on Networked Systems (NetSys)},year = {2019},doi = {10.1109/NetSys.2019.8854524},publisher = {IEEE}

}

:

Institute of Architecture of Application Systems

top related