Author of the publication

Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN.

, , , , , and . IM, page 594-598. IFIP, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GEIGER: Solution for small businesses to protect themselves against cyber-threats., , , and . ARES, page 157:1-157:4. ACM, (2021)Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions., , , , and . CNSM, page 1-9. IEEE, (2019)The Forth International Workshop on Security Testing (SECTEST 2013)., and . ICST Workshops, page 433-434. IEEE Computer Society, (2013)Dynamic Deployment and Monitoring of Security Policies., , , , and . TrustBus, volume 9264 of Lecture Notes in Computer Science, page 180-192. Springer, (2015)AI-Powered Penetration Testing using Shennina: From Simulation to Validation., , , , , , and . ARES, page 169:1-169:7. ACM, (2024)Metrics-driven DevSecOps., , , and . ICSOFT, page 228-233. ScitePress, (2020)A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic., , , , , and . ICSOFT, page 234-241. SCITEPRESS, (2022)The DYNABIC approach to resilience of critical infrastructures., , , , , , , , , and 2 other author(s). ARES, page 136:1-136:8. ACM, (2023)5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection., , , , and . ARES, page 106:1-106:8. ACM, (2021)Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking., , and . ADHOC-NOW, volume 5198 of Lecture Notes in Computer Science, page 345-356. Springer, (2008)