Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unveiling the user requirements of a cyber range for 5G security testing and training., , , , and . CAMAD, page 1-6. IEEE, (2021)Quantum Abstraction Interface: Facilitating Integration of QKD Devices in SDN Networks., , , , , , , and . ICTON, page 1-4. IEEE, (2020)Framework for the development of a Network Digital Twin., , , , and . NOMS, page 1-5. IEEE, (2024)A data infrastructure for heterogeneous telemetry adaptation. Application to Netflow-based cryptojacking detection., , , , and . ICIN, page 105-112. IEEE, (2023)B5GEMINI: Digital Twin Network for 5G and Beyond., , , , and . NOMS, page 1-6. IEEE, (2022)A Multi-domain Testbed for Collaborative Research on the IoT-Edge-Cloud Continuum., , , , , , , , and . SECON, page 394-395. IEEE, (2023)The use of 5G Non-Public Networks to support Industry 4.0 scenarios., , , and . CSCN, page 1-7. IEEE, (2019)The Mouseworld, a security traffic analysis lab based on NFV/SDN., , , , and . ARES, page 57:1-57:6. ACM, (2018)A methodological framework for optimizing the energy consumption of deep neural networks: a case study of a cyber threat detector., , , and . Neural Comput. Appl., 36 (17): 10297-10338 (2024)Implementation of a traffic flow path verification system in a data network., , , , and . EuCNC/6G Summit, page 943-948. IEEE, (2024)