Author of the publication

Assuring virtual network function image integrity and host sealing in Telco cloue.

, , , and . ICC, page 1-6. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NFV: Security Threats and Best Practices., , and . IEEE Communications Magazine, 55 (8): 211-217 (2017)Towards Dependably Detecting Geolocation of Cloud Servers., , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 643-656. Springer, (2017)Instance Based Dynamic Feature Selection for Network Traffic Monitoring., , and . IICAI, page 733-755. IICAI, (2011)A reversible code over GF(q)., and . Kybernetika, 22 (1): 85-91 (1986)Survey of cloud server geolocating techniques., , and . FRUCT, page 54-65. IEEE, (2016)Experiences in Trusted Cloud Computing., , and . J. ICT Stand., 6 (3): 263-278 (2018)Instance Based Classification for Decision Making in Network Data., , and . J. Intell. Syst., 21 (2): 167-193 (2012)Parametric Decomposition of Sample Space for Classification., , and . J. Intell. Syst., 19 (2): 163-189 (2010)Real Time Rough Set based Behavior Cluster Modeling System., and . IICAI, page 787-802. IICAI, (2011)Classification Based on Parametric Partitioning of Solution Space., , and . IICAI, page 388-407. IICAI, (2009)