Author of the publication

Performance Modeling And Analysis Of An Autonomic Router.

, , , and . ECMS, page 441-447. European Council for Modeling and Simulation, (2019)Communications of the ECMS, Volume 33, Issue 1, June 2019.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Modeling of the Behaviour of an Autonomic Router., , , and . VALUETOOLS, page 193-194. ACM, (2019)Towards a cloud model choice evaluation: comparison between cost/features and ontology-based analysis., , , , and . Int. J. Grid Util. Comput., 14 (1): 15-28 (2023)A cyber warfare perspective on risks related to health IoT devices and contact tracing., , , , , and . Neural Comput. Appl., 35 (19): 13823-13837 (July 2023)Hybrid Simulation of Energy Management in IoT Edge Computing Surveillance Systems., , , and . EPEW, volume 13104 of Lecture Notes in Computer Science, page 345-359. Springer, (2021)Exploring a Federated Learning Approach to Enhance Authorship Attribution of Misleading Information from Heterogeneous Sources., , , , and . IJCNN, page 1-8. IEEE, (2021)Applying Machine Learning to Weather and Pollution Data Analysis for a Better Management of Local Areas: The Case of Napoli, Italy., , , , , and . IoTBDS, page 354-363. SCITEPRESS, (2021)A Conceptual Model for the General Data Protection Regulation., , and . ICCSA (8), volume 12956 of Lecture Notes in Computer Science, page 60-77. Springer, (2021)XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks., , , and . AINA (5), volume 203 of Lecture Notes on Data Engineering and Communications Technologies, page 317-326. Springer, (2024)Fuzzy-based Severity Evaluation in Privacy Problems: an Application to Healthcare., , , , , and . EDCC, page 147-154. IEEE, (2024)A Tool to Support Automation of Risk Assessment., , , and . ICCSA (Workshops 8), volume 14822 of Lecture Notes in Computer Science, page 126-143. Springer, (2024)