Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services., , and . J. Netw. Syst. Manag., 32 (1): 21 (March 2024)HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots., , and . NOMS, page 1-9. IEEE, (2023)VoIP Malware: Attack Tool & Attack Scenarios., , and . ICC, page 1-6. IEEE, (2009)Leveraging in-network real-value computation for home network device recognition., , , and . IM, page 734-735. IEEE, (2021)CMSec: A Vulnerability Prevention Tool for Supporting Migrations in Cloud Composite Services., , and . CloudNet, page 267-271. IEEE, (2022)An Analysis of Cloud Gaming Platforms Behavior under Different Network Constraints., , , , , and . CNSM, page 551-557. IEEE, (2021)Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN., , , , , and . IM, page 594-598. IFIP, (2019)Passive Inference of User Actions through IoT Gateway Encrypted Traffic Analysis., , and . IM, page 7-12. IFIP, (2019)Vulnet: Learning Navigation in an Attack Graph., , , and . NetSoft, page 393-398. IEEE, (2024)An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions., , , , , , and . J. Netw. Syst. Manag., 31 (2): 39 (April 2023)