Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Security Management for Virtual Services., , , , , and . NFV-SDN, page 1-2. IEEE, (2019)Evaluation of the data handling pipeline of the ASTRID framework., and . NetSoft, page 456-461. IEEE, (2022)Exploring the trade-off between performance and energy consumption in cloud infrastructures., , and . FMEC, page 121-126. IEEE, (2017)A framework to correlate power consumption and resource usage in cloud infrastructures., , , and . NetSoft, page 1-5. IEEE, (2017)Enabling Edge Computing Deployment in 4G and Beyond., , , , , and . NetSoft, page 237-241. IEEE, (2020)Towards Novel Security Architectures for Network Functions Virtualization., , and . NFV-SDN, page 1-5. IEEE, (2019)Automating Mitigation of Amplification Attacks in NFV Services., , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2382-2396 (2022)DROP: An Open-Source Project towards Distributed SW Router Architectures., , , and . GLOBECOM, page 1-6. IEEE, (2009)Leveraging the 5G architecture to mitigate amplification attacks., , , , , , , and . NetSoft, page 443-449. IEEE, (2021)OpenVolcano: An Open-Source Software Platform for Fog Computing., , , , and . PROCON@ITC, page 22-27. IEEE, (2016)