From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A deterministic approach for extracting network security intents., , , , , , , и . Comput. Networks, (2022)Provotum: A Blockchain-based and End-to-end Verifiable Remote Electronic Voting System., , , , , , , и . LCN, стр. 172-183. IEEE, (2020)Enabling Dynamic SLA Compensation Using Blockchain-based Smart Contracts., , , и . IM, стр. 53-61. IFIP, (2019)PerfResolv: A Geo-Distributed Approach for Performance Analysis of Public DNS Resolvers Based on Domain Popularity., , , , и . AINA (2), том 200 из Lecture Notes on Data Engineering and Communications Technologies, стр. 35-47. Springer, (2024)WeTrace: A privacy-preserving tracing approach., , , , , , , и . J. Commun. Networks, 23 (5): 374-389 (2021)AMNESiA: Affinity measurement platform for NFV-enabled networks., , , , , и . IM, стр. 899-900. IEEE, (2017)Guiltiness: A practical approach for quantifying virtual network functions performance., , , , , , , и . Comput. Networks, (2019)SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management., , , , , , и . CNSM, стр. 1-7. IEEE, (2020)BRAIN: Blockchain-based Reverse Auction for Infrastructure Supply in Virtual Network Functions-as-a -Service., , , и . Networking, стр. 1-9. IEEE, (2019)Affinity measurement for NFV-enabled networks: A criteria-based approach., , , , , и . IM, стр. 125-133. IEEE, (2017)