Author of the publication

Leveraging in-network real-value computation for home network device recognition.

, , , and . IM, page 734-735. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots., , and . NOMS, page 1-9. IEEE, (2023)C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services., , and . J. Netw. Syst. Manag., 32 (1): 21 (March 2024)An Analysis of Cloud Gaming Platforms Behavior under Different Network Constraints., , , , , and . CNSM, page 551-557. IEEE, (2021)Passive Inference of User Actions through IoT Gateway Encrypted Traffic Analysis., , and . IM, page 7-12. IFIP, (2019)Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN., , , , , and . IM, page 594-598. IFIP, (2019)Vulnet: Learning Navigation in an Attack Graph., , , and . NetSoft, page 393-398. IEEE, (2024)Towards Automating Security Enhancement for Cloud Services., , and . IM, page 692-696. IEEE, (2021)An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions., , , , , , and . J. Netw. Syst. Manag., 31 (2): 39 (April 2023)Efficient Identification of Cloud Gaming Traffic at the Edge., , , , and . NOMS, page 1-10. IEEE, (2023)Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions., , , , and . CNSM, page 1-9. IEEE, (2019)