From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A deterministic approach for extracting network security intents., , , , , , , и . Comput. Networks, (2022)Refining Network Intents for Self-Driving Networks., , , и . SelfDN@SIGCOMM, стр. 15-21. ACM, (2018)Examining the Centralization of Email Industry: A Landscape Analysis for IPv4 and IPv6., , , и . ISCC, стр. 360-366. IEEE, (2023)Guiltiness: A practical approach for quantifying virtual network functions performance., , , , , , , и . Comput. Networks, (2019)Hosting Industry Centralization and Consolidation., , , , , и . NOMS, стр. 1-9. IEEE, (2022)AI/ML for Network Security: The Emperor has no Clothes., , , , , и . CCS, стр. 1537-1551. ACM, (2022)DWT in P4: Periodicity Detection in the Data Plane., , , , , , и . GLOBECOM, стр. 6343-6348. IEEE, (2022)ShadowFS: Speeding-up Data Plane Monitoring and Telemetry using P4., , , , , , и . ICC, стр. 1-6. IEEE, (2020)Predicting Elephant Flows in Internet Exchange Point Programmable Networks., , , и . AINA, том 926 из Advances in Intelligent Systems and Computing, стр. 485-497. Springer, (2019)Refining Network Intents for Self-Driving Networks., , , и . CoRR, (2020)