Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized Enterprises., , , , , , , , , and 22 other author(s). MeditCom, page 500-505. IEEE, (2021)PALANTIR demo: leveraging SecaaS model for managing threats in industrial environments., , , , , , , , , and 19 other author(s). MeditCom, page 82-85. IEEE, (2022)PALANTIR: An NFV-Based Security-as-a-Service Approach for Automating Threat Mitigation., , , , , , , , and . Sensors, 23 (3): 1658 (February 2023)SDN-based service function chaining mechanism and service prototype implementation in NFV scenario., , , , , , , , and . Comput. Stand. Interfaces, (2017)Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks., , , , , , and . IEEE Access, (2024)On the Applications of Efficient NFV Management Towards 5G Networking., , , , and . 5GU, page 1-5. ICST, (2014)System architecture and deployment scenarios for SESAME: Small cEllS coodinAtion for Multi-tenancy and Edge services., , , , , , , , and . NetSoft, page 447-452. IEEE, (2016)IoT Botnet Detection on Flow Data using Autoencoders., , , , , , , and . MeditCom, page 506-511. IEEE, (2021)Leveraging Deep Learning for Network Anomaly Detection., , , , and . FMEC, page 1-6. IEEE, (2021)SHIELD: A novel NFV-based cybersecurity framework., , , , , , , , , and 18 other author(s). NetSoft, page 1-6. IEEE, (2017)