Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services., , and . J. Netw. Syst. Manag., 32 (1): 21 (March 2024)HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots., , and . NOMS, page 1-9. IEEE, (2023)An Analysis of Cloud Gaming Platforms Behavior under Different Network Constraints., , , , , and . CNSM, page 551-557. IEEE, (2021)Passive Inference of User Actions through IoT Gateway Encrypted Traffic Analysis., , and . IM, page 7-12. IFIP, (2019)Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN., , , , , and . IM, page 594-598. IFIP, (2019)An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions., , , , , , and . J. Netw. Syst. Manag., 31 (2): 39 (April 2023)Towards Automating Security Enhancement for Cloud Services., , and . IM, page 692-696. IEEE, (2021)Efficient Identification of Cloud Gaming Traffic at the Edge., , , , and . NOMS, page 1-10. IEEE, (2023)Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions., , , , and . CNSM, page 1-9. IEEE, (2019)VoIP Malware: Attack Tool & Attack Scenarios., , and . ICC, page 1-6. IEEE, (2009)