Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Overcoming the memory limits of network devices in SDN-enabled data centers., , and . IM, page 897-898. IEEE, (2017)Reusability of software-defined networking applications: A runtime, multi-controller approach., , , , and . CNSM, page 209-215. IEEE, (2016)NetIDE: Removing vendor lock-in in SDN., , , , , , , and . NetSoft, page 1-2. IEEE, (2015)VeRTIGO: Network Virtualization and Beyond., , , , and . EWSDN, page 24-29. IEEE Computer Society, (2012)LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection., , , , and . CoRR, (2020)Demonstrating a Distributed and Version-agnostic OpenFlow Slicing Mechanism, , , and . Third European Workshop on Software Defined Networks, page 2. (2014)Online Learning and Model Pruning Against Concept Drifts in Edge Devices., , , , , and . NetSoft, page 351-356. IEEE, (2024)Design and Implementation of an OpenFlow Hardware Abstraction Layer, , , , , , , , , and 2 other author(s). Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, page 71--76. New York, NY, USA, ACM, (2014)An effective swapping mechanism to overcome the memory limitation of SDN devices., , and . IM, page 247-254. IEEE, (2017)Methods and Techniques for Dynamic Deployability of Software-Defined Security Services.. CoRR, (2020)