From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Guiltiness: A practical approach for quantifying virtual network functions performance., , , , , , , и . Comput. Networks, (2019)FlowStalker: Comprehensive Traffic Flow Monitoring on the Data Plane using P4., , и . ICC, стр. 1-6. IEEE, (2019)ARKHAM: An Advanced Refinement toolkit for Handling Service Level Agreements in Software-Defined Networking., , , и . J. Netw. Comput. Appl., (2017)POSTER: Finding Vulnerabilities in P4 Programs with Assertion-based Verification., , , и . CCS, стр. 2495-2497. ACM, (2017)Verification of Policy-Based Self-Managed Cell Interactions Using Alloy., , , и . POLICY, стр. 37-40. IEEE Computer Society, (2009)Emprego de NFV e Aprendizagem por Reforço para Detectar e Mitigar Anomalias em Redes Definidas por Software., , , и . SBRC, (2017)Mitigando Ataques com a Orquestração de VNFs Baseadas em Contêineres Usando Aprendizado Supervisionado., и . SBRC, стр. 350-363. (2021)Customizable Deployment of NFV Services., , , , , , , и . J. Netw. Syst. Manag., 29 (3): 36 (2021)Safeguarding from abuse by IoT vendors: Edge messages verification of cloud-assisted equipment., , , , , , , , , и . IM, стр. 599-603. IFIP, (2019)Attack Pattern Recognition Through Correlating Cyber Situational Awareness in Computer Networks., , и . Cyberpatterns, Springer, (2014)