Author of the publication

Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV.

, , , , , and . SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 287-301. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV., , , , , and . SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 287-301. Springer, (2019)On Achieving Trustworthy Service Function Chaining., , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (3): 3140-3153 (2021)On Efficient Federated Learning for Aerial Remote Sensing Image Classification: A Filter Pruning Approach., , , , , and . ICONIP (4), volume 14450 of Lecture Notes in Computer Science, page 184-199. Springer, (2023)ConstDet: Control Semantics-Based Detection for GPS Spoofing Attacks on UAVs., , , , and . Remote. Sens., 14 (21): 5587 (2022)The Impact of Hoffmann Reflex on Standing Postural Control Complexity in the Elderly with Impaired Plantar Sensation., , , , and . Entropy, 25 (1): 64 (January 2023)Analysis of macro diversity based on maximum ratio combining in long range ALOHA networks., , and . Telecommun. Syst., 72 (3): 471-482 (2019)NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures., , , , and . IEEE Commun. Surv. Tutorials, 20 (4): 3330-3368 (2018)