Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Security Monitoring of Real IoT Testbeds., , , and . ICSOFT, page 645-652. SCITEPRESS, (2021)Software Defined Monitoring (SDM) for 5G mobile backhaul networks., , , , , , and . LANMAN, page 1-6. IEEE, (2017)Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms., , , , , and . ICTSS, volume 11812 of Lecture Notes in Computer Science, page 270-278. Springer, (2019)Leveraging LTE security with SDN and NFV., , , , , and . ICIIS, page 220-225. IEEE, (2015)Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN., , , , , and . IM, page 594-598. IFIP, (2019)AI4SOAR: A Security Intelligence Tool for Automated Incident Response., , , and . ARES, page 170:1-170:8. ACM, (2024)The SPATIAL Architecture: Design and Development Experiences from Gauging and Monitoring the AI Inference Capabilities of Modern Applications., , , , , , , , , and 21 other author(s). ICDCS, page 947-959. IEEE, (2024)An advanced approach for modeling and detecting software vulnerabilities., , , , , , and . Inf. Softw. Technol., 54 (9): 997-1013 (2012)The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service., , , , , , , , , and 4 other author(s). ARES, page 68:1-68:7. ACM, (2022)Using 5G to Bring More than just Bits to Homes., , , , , , , , and . BMSB, page 1-8. IEEE, (2020)