Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the design and development of emulation platforms for NFV-based infrastructures., , , , , , , , , and 1 other author(s). Int. J. Grid Util. Comput., 11 (2): 230-242 (2020)Blockchain-Based Voting Considered Harmful?, , , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 3603-3618 (2022)Blockchain Signaling System (BloSS): Cooperative Signaling of Distributed Denial-of-Service Attacks., , , , and . J. Netw. Syst. Manag., 28 (4): 953-989 (2020)SECAdvisor: a Tool for Cybersecurity Planning using Economic Models., , , , and . CoRR, (2023)QuantTM: Business-Centric Threat Quantification for Risk Management and Cyber Resilience., , , and . CoRR, (2024)Traffic Centralization and Digital Sovereignty: An Analysis Under the Lens of DNS Servers., , , , and . CoRR, (2023)A Controlled Natural Language to Support Intent-based Blockchain Selection., , , , and . IEEE ICBC, page 1-9. IEEE, (2020)On the Use of a Measurement Correlation Service for Measurement Federations., , , and . ISCC, page 243-248. IEEE, (2018)A model for quantifying performance degradation in virtual network function service chains., , , , , , and . NOMS, page 1-9. IEEE, (2018)ASIMOV: a Fully Passive WiFi Device Tracking., , , , , , and . Networking, page 1-3. IEEE, (2021)