Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An OpenFlow-based architecture for IaaS security., , , and . ATACCS, page 118-121. ACM, (2013)Automating Ethernet VPN deployment in SDN-based Data Centers., , , , , and . SDS, page 61-66. IEEE, (2017)Exploiting SDN Approach to Tackle Cloud Computing Security Issues in the ATC Scenario., , , , and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 54-60. Springer, (2013)On the Evaluation of VM Provisioning Time in Cloud Platforms for Mission-Critical Infrastructures., , , , , and . CCGRID, page 802-810. IEEE Computer Society, (2014)A Power Efficient and Robust Virtual Network Functions Placement Problem, and . 28th International Teletraffic Congress (ITC 28), Würzburg, Germany, (September 2016)A Simulated Annealing Based Approach for Power Efficient Virtual Machines Consolidation., and . CLOUD, page 445-452. IEEE Computer Society, (2015)Integrating SDN and NFV with QoS-Aware Service Composition., , , , , , , and . Autonomous Control for a Reliable Internet of Services, volume 10768 of Lecture Notes in Computer Science, Springer, (2018)Applying the SecRAM Methodology in a CLOUD-Based ATM Environment., , , , and . ARES, page 807-813. IEEE Computer Society, (2013)On the Transition of Legacy Networks to SDN - An Analysis on the Impact of Deployment Time, Number, and Location of Controllers., , , , and . IM, page 367-375. IEEE, (2021)Anomaly Detection in Logs: A Comparative Analysis of Unsupervised Algorithms., , , , , , and . SLATE, volume 120 of OASIcs, page 12:1-12:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2024)