From Firewalls to Functions and Back

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: L. Ceragioli, L. Galletta, M. Tempesta

Journal title: Proceedings of the Third Italian Conference on Cyber Security

Journal publisher: CEUR-WS.org

Published year: 2019

ISSN: 1613-0073