From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Threat detection and mitigation with MonB5G components in the aLTEr scenario., , и . MeditCom, стр. 1-2. IEEE, (2021)MonB5G: AI/ML-Capable Distributed Orchestration and Management Framework for Network Slices., , , , , , , , , и 2 other автор(ы). MeditCom, стр. 29-34. IEEE, (2021)Impacts of Service Decomposition Models on Security Attributes: A Case Study with 5G Network Repository Function., , , и . NetSoft, стр. 470-476. IEEE, (2021)Managing Secure Inter-slice Communication in 5G Network Slice Chains., , , , , и . DBSec, том 12122 из Lecture Notes in Computer Science, стр. 24-41. Springer, (2020)A network tomography approach for anomaly localization in Service Function Chaining., , , и . ISNCC, стр. 1-6. IEEE, (2021)VNF placement algorithms to address the mono-and multi-tenant issues in edge and core networks., , , , и . CloudNet, стр. 1-6. IEEE, (2019)KRS: Kubernetes Resource Scheduler for resilient NFV networks., , и . GLOBECOM, стр. 1-6. IEEE, (2021)Arbitration Among Vertical Services., , , , , , , , и . PIMRC, стр. 153-157. IEEE, (2018)Formalization of a security access control model for the 5G system., , , , , и . NOF, стр. 150-158. IEEE, (2020)Optimization of Network Services Embedding Costs over Public and Private Clouds., , , , и . ICOIN, стр. 360-365. IEEE, (2020)