Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collateral Damage of Facebook Applications: a Comprehensive Study., , , , , and . IACR Cryptology ePrint Archive, (2018)Security Requirements for Multi-operator Virtualized Network and Service Orchestration for 5G., , , , and . Guide to Security in SDN and NFV, Springer, (2017)Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions., , and . IEEE Commun. Mag., 58 (7): 72-77 (2020)Analysis of end-to-end multi-domain management and orchestration frameworks for software defined infrastructures: an architectural survey., , , , , , , , , and 12 other author(s). Trans. Emerg. Telecommun. Technol., (2017)Games in the Time of COVID-19: Promoting Mechanism Design for Pandemic Response., and . CoRR, (2021)Collateral damage of Facebook third-party applications: a comprehensive study., , , , , and . Comput. Secur., (2018)Enablers for Energy Efficient Wireless Networks., , , , , , , , , and 1 other author(s). VTC Fall, page 1-5. IEEE, (2010)On pricing online data backup., and . INFOCOM Workshops, page 564-569. IEEE, (2015)MAIPAN - Middleware for Application Interconnection in Personal Area Networks., , , , and . MobiQuitous, page 494-498. IEEE Computer Society, (2005)Hierarchical architecture for managed wireless networks., , and . CoNEXT, page 260-261. ACM, (2005)