Author of the publication

Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV.

, , , , , and . SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 287-301. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Pattaranantakul, Montida
add a person with the name Pattaranantakul, Montida
 

Other publications of authors with the same name

IoTDePT: Detecting Security Threats and Pinpointing Anomalies in an IoT environment., , , and . ICSCA, page 232-236. ACM, (2020)Service Function Chaining security survey: Addressing security challenges and threats., , and . Comput. Networks, (February 2023)On Achieving Trustworthy Service Function Chaining., , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (3): 3140-3153 (2021)NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures., , , , and . IEEE Commun. Surv. Tutorials, 20 (4): 3330-3368 (2018)Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (1): 372-383 (2021)Moving towards software-defined security in the era of NFV and SDN. (Vers une programmabilité de la sécurité dans les environnements réseaux logiciels et virtualisés (NFV et SDN)).. University of Paris-Saclay, France, (2019)Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV., , , , , and . SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 287-301. Springer, (2019)Secure and efficient key management technique in quantum cryptography network., , , , and . ICUFN, page 280-285. IEEE, (2012)Safeguarding Devices and Edge Computing: A Responsive Anti-Scam Approach., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 264-268. IEEE, (2023)