Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight DDoS flooding attack detection using NOX/OpenFlow., , and . LCN, page 408-415. IEEE Computer Society, (2010)BGP Dataset Generation and Feature Extraction for Anomaly Detection., , , and . ISCC, page 1-6. IEEE, (2019)Innovating on Interdomain Routing with an Inter-SDN Component., , , and . AINA, page 131-138. IEEE Computer Society, (2014)A replication component for resilient OpenFlow-based networking., , , and . NOMS, page 933-939. IEEE, (2012)Resilience of SDNs based On active and passive replication mechanisms., , , and . GLOBECOM, page 2188-2193. IEEE, (2013)An inter-AS routing component for software-defined networks., , , and . NOMS, page 138-145. IEEE, (2012)Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS., , and . SAC, page 86-87. ACM, (2009)Investigação do impacto do SRTP em comunicações voz sobre IP., , , and . WebMedia (Companion), page 164-166. ACM, (2008)Synchronizing web browsing data with Browserver., , , , , and . ISCC, page 738-743. IEEE Computer Society, (2010)Can I Add a Secure VoIP Call?., , , , and . WOWMOM, page 435-437. IEEE Computer Society, (2006)