Author of the publication

SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment.

, , , , , , , , , and 4 other author(s). Guide to Security in SDN and NFV, Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ensembled Outlier Detection using Multi-Variable Correlation in WSN through Unsupervised Learning Techniques., , and . IoTBDS, page 38-48. SciTePress, (2019)Preface., , and . IxD&A, (2019)Experimental evaluation of a Recursive InterNetwork Architecture prototype., , , , , , , , and . GLOBECOM, page 2017-2022. IEEE, (2014)IRATI: Open source RINA implementation for Linux., , , , , , , and . Softw. Impacts, (2019)Coding techniques for distributed storage.. Autonomous University of Barcelona, Spain, (2013)Quasi-cyclic Minimum Storage Regenerating Codes for Distributed Data Compression., , and . DCC, page 33-42. IEEE Computer Society, (2011)A framework for assessing, comparing and predicting the performance of autonomous rfid-based inventory robots for retail: validation dataset., , , and . (May 2022)A realistic distributed storage system: the rack model, , and . CoRR, (2013)Non-homogeneous two-rack model for distributed storage systems., , , and . ISIT, page 1237-1241. IEEE, (2013)SHIELD: A novel NFV-based cybersecurity framework., , , , , , , , , and 18 other author(s). NetSoft, page 1-6. IEEE, (2017)