Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spam over Internet telephony: Prototype implementation., and . ICT, page 1-6. IEEE, (2008)Towards Accelerating Intrusion Detection Operations at the Edge Network using FPGAs., , , , , , and . FMEC, page 104-111. IEEE, (2020)EMYNOS: Next Generation Emergency Communication., , , , , and . IEEE Commun. Mag., 55 (1): 139-145 (2017)Towards a next generation 112 testbed: The EMYNOS ESInet., , , , , and . Int. J. Crit. Infrastructure Prot., (2018)Industrial Grade Methodology for Firewall Simulation and Requirements Verification., , , , and . NOMS, page 1-7. IEEE, (2020)Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations., , , , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 236-237. Springer, (2012)Emergency Services Control Model for Next Generation Networks., , , and . Netw. Protoc. Algorithms, 1 (2): 99-112 (2009)TTCN-3 based NG112 Test System and Playground for Emergency Communication., , , and . QRS Companion, page 492-497. IEEE, (2020)T-NOVA: A marketplace for virtualized network functions., , , , , , , , , and 2 other author(s). EuCNC, page 1-5. IEEE, (2014)The market for open source: An intelligent virtual open source marketplace., , , , , , , , , and 5 other author(s). CSMR-WCRE, page 399-402. IEEE Computer Society, (2014)