Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demo: Utilizing SRv6 to Optimize the Routing Behavior for Tactical Networks., , , , , and . WoWMoM, page 361-363. IEEE, (2023)Coexisting attractors and chaotic canard explosions in a slow-fast optomechanical system, and . Physical Review E, (May 21, 2013)Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control., , , , , , , and . IEEE Communications Magazine, 58 (7): 65-71 (2020)Towards a softwarized and secure Internet of Things.. Sant'Anna School of Advanced Studies, Italy, (2018)Orchestrating Collaborative Cybersecurity: A Secure Framework for Distributed Privacy-Preserving Threat Intelligence Sharing., , , , , , and . CoRR, (2022)Modeling and performance simulation of EPC Gen2 RFID on OPNET., , and . M&N, page 83-88. IEEE, (2013)Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability., , , , , , , and . NetSoft, page 254-256. IEEE, (2019)Routing update period in Cognitive Radio Ad Hoc Networks., , , and . M&N, page 100-104. IEEE, (2013)Automatic contract negotiation, service discovery and mutual authentication solutions: A survey on the enabling technologies of the forthcoming IoT ecosystems., , and . Comput. Networks, (2019)SCOR: A secure international informatics infrastructure to investigate COVID-19., , , , , , , , , and 24 other author(s). J. Am. Medical Informatics Assoc., 27 (11): 1721-1726 (2020)