Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralized detection of network attacks through P2P data clustering of SNMP data., , , and . Comput. Secur., (2015)Telecom Software, Network Virtualization, and Software Defined Networks., , , and . IEEE Commun. Mag., 57 (10): 40-41 (2019)Network Softwarization and Management., , , and . IEEE Commun. Mag., 58 (10): 14-15 (2020)Programmable Multi-Granular Optical Router: Modular Architecture and Testing., , , and . GLOBECOM, page 1-6. IEEE, (2010)Dynamic DWDM Exploitation in Connection-Oriented Optical Packet Switches., , , and . ONDM, volume 242 of IFIP Conference Proceedings, page 151-166. Kluwer, (2002)All electrical vehicles connected to the Internet: Implementation and experiments., , , , , and . SustainIT, page 1-8. IEEE Computer Society, (2013)Dynamic chaining of Virtual Network Functions in cloud-based edge networks., , , and . NetSoft, page 1-5. IEEE, (2015)Performance of Service Function Chaining on the OpenStack Cloud Platform., , , , and . CNSM, page 432-437. IEEE Computer Society, (2018)Demonstration of Latency-Aware and Self-Adaptive Service Chaining in 5G/SDN/NFV infrastructures., , , , , , , , and . NFV-SDN, page 1-2. IEEE, (2018)Distributed Management of Dynamic Reliability in Beyond 5G Industrial Environments for Extreme Low Latency Communication., , , , , , and . DRCN, page 1-7. IEEE, (2023)