Author of the publication

Exploiting SDN Approach to Tackle Cloud Computing Security Issues in the ATC Scenario.

, , , , and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 54-60. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automating Ethernet VPN deployment in SDN-based Data Centers., , , , , and . SDS, page 61-66. IEEE, (2017)An OpenFlow-based architecture for IaaS security., , , and . ATACCS, page 118-121. ACM, (2013)Exploiting SDN Approach to Tackle Cloud Computing Security Issues in the ATC Scenario., , , , and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 54-60. Springer, (2013)On the Evaluation of VM Provisioning Time in Cloud Platforms for Mission-Critical Infrastructures., , , , , and . CCGRID, page 802-810. IEEE Computer Society, (2014)A Power Efficient and Robust Virtual Network Functions Placement Problem, and . 28th International Teletraffic Congress (ITC 28), Würzburg, Germany, (September 2016)A Simulated Annealing Based Approach for Power Efficient Virtual Machines Consolidation., and . CLOUD, page 445-452. IEEE Computer Society, (2015)Integrating SDN and NFV with QoS-Aware Service Composition., , , , , , , and . Autonomous Control for a Reliable Internet of Services, volume 10768 of Lecture Notes in Computer Science, Springer, (2018)Applying the SecRAM Methodology in a CLOUD-Based ATM Environment., , , , and . ARES, page 807-813. IEEE Computer Society, (2013)On the Transition of Legacy Networks to SDN - An Analysis on the Impact of Deployment Time, Number, and Location of Controllers., , , , and . IM, page 367-375. IEEE, (2021)Combining NOMA-OMA with a Multiagent Architeture for Enhanced Spectrum Sharing in 6G., , , and . NOMS, page 1-7. IEEE, (2023)