Author of the publication

NOVI Tools and Algorithms for Federating Virtualized Infrastructures.

, , , , , , , and . Future Internet Assembly, volume 7281 of Lecture Notes in Computer Science, page 213-224. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging on the XDP Framework for the Efficient Mitigation of Water Torture Attacks within Authoritative DNS Servers., , and . NetSoft, page 287-291. IEEE, (2020)Control-plane slicing methods in multi-tenant software defined networks., , , , , and . IM, page 612-618. IEEE, (2015)Enabling Privacy-Aware Zone Exchanges Among Authoritative and Recursive DNS Servers., , and . ANRW, page 1-8. ACM, (2020)Enhancing Soft Skills in Network Management Education: A Study on the Impact of GenAI-Based Virtual Assistants., , and . EDUCON, page 1-5. IEEE, (2024)A novel load balancing mechanism for P2P networking., , and . GridNets, page 14. ICST, (2007)Leveraging SDN for Efficient Anomaly Detection and Mitigation on Legacy Networks., , and . EWSDN, page 85-90. IEEE Computer Society, (2014)Mitigation of Multi-vector Network Attacks via Orchestration of Distributed Rule Placement., , , and . IM, page 162-170. IFIP, (2019)Detecting Incoming and Outgoing DDoS Attacks at the Edge Using a Single Set of Network Characteristics., and . ISCC, page 469-475. IEEE Computer Society, (2005)A Privacy-Preserving Schema for the Detection and Collaborative Mitigation of DNS Water Torture Attacks in Cloud Infrastructures., , , , and . CloudNet, page 1-6. IEEE, (2019)Data fusion algorithms for network anomaly detection: classification and evaluation., , , , and . ICNS, page 50. IEEE Computer Society, (2007)