Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Secure and Optimized Cross-Slice Communication Establishment., , , , , and . NetSoft, page 127-132. IEEE, (2022)Web graph similarity for anomaly detection (poster)., , and . WWW, page 1167-1168. ACM, (2008)PFA-INT: Lightweight In-Band Network Telemetry with Per-Flow Aggregation., , and . NFV-SDN, page 60-66. IEEE, (2021)Virtual Public Networks., , , , , and . EWSDN, page 1-6. IEEE Computer Society, (2013)On Assigning Implicit Reputation Scores in an Online Labor Marketplace., , , and . EDBT, page 724-725. OpenProceedings.org, (2014)Integrity 2020: Integrity in Social Networks and Media., , , , , , , and . WSDM, page 905-906. ACM, (2020)Intelligent Network Service Embedding using Genetic Algorithms., and . ISCC, page 1-7. IEEE, (2021)An integrated smooth transmission control and temporal scaling scheme for MPEG-4 streaming video.. ICME, page 33-36. IEEE Computer Society, (2008)Multi-PoP Network Slice Deployment: A Feasibility Study., , , , , , , and . CloudNet, page 1-6. IEEE, (2019)Invariant Preserving Middlebox Traversal., and . WWIC, volume 9071 of Lecture Notes in Computer Science, page 139-150. Springer, (2015)