Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of Zero-Trust multi-cloud., , , , and . CLOUD, page 730-732. IEEE, (2021)The KiTS21 Challenge: Automatic segmentation of kidneys, renal tumors, and renal cysts in corticomedullary-phase CT., , , , , , , , , and 35 other author(s). CoRR, (2023)Detecting Link Fabrication Attacks in Software-Defined Networks., , , and . ICCCN, page 1-8. IEEE, (2017)SECAP Switch - Defeating Topology Poisoning Attacks Using P4 Data Planes., , , , and . J. Netw. Syst. Manag., 31 (1): 28 (March 2023)Automatic Segmentation of Kidneys and Kidney Tumors: The KiTS19 International Challenge., , , , , , , , , and 12 other author(s). Frontiers Digit. Health, (2021)The state of the art in kidney and kidney tumor segmentation in contrast-enhanced CT imaging: Results of the KiTS19 Challenge., , , , , , , , , and 31 other author(s). CoRR, (2019)Rule-based program specialization to optimize gradually typed code., , and . Knowl. Based Syst., (2019)Exploiting pitfalls in software-defined networking implementation., , , and . Cyber Security And Protection Of Digital Services, page 1-8. IEEE, (2016)Attacking distributed software-defined networks by leveraging network state consistency., , , and . Comput. Networks, (2019)ISPyB: an information management system for synchrotron macromolecular crystallography., , , , , , , , , and 7 other author(s). Bioinform., 27 (22): 3186-3192 (2011)