Author of the publication

Quality Evaluation in Peer-to-Peer IPTV Services.

, , , , , , , and . Data Traffic Monitoring and Analysis, volume 7754 of Lecture Notes in Computer Science, Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multimodal QoE evaluation in P2P-based IPTV systems., , , , and . ACM Multimedia, page 1321-1324. ACM, (2011)Evaluating the Real-World Performance of 5G Fixed Wireless Broadband in Rural Areas., , , and . 5G World Forum, page 465-470. IEEE, (2019)Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems., , , , , and . CPSIOTSEC@CCS, page 63-68. ACM, (2021)To All Intents and Purposes: Towards Flexible Intent Expression., , , and . NetSoft, page 31-37. IEEE, (2021)Practical Intrusion Detection of Emerging Threats., , , and . IEEE Trans. Netw. Serv. Manag., 19 (1): 582-600 (2022)Safe and Secure Software-Defined Networks for Smart Electricity Substations., , , , and . ACIIDS (Companion), volume 1178 of Communications in Computer and Information Science, page 179-191. Springer, (2020)Just Browsing?: Understanding User Journeys in Online TV., , , and . ACM Multimedia, page 965-968. ACM, (2014)P2P-Based IPTV Services: Design, Deployment, and QoE Measurement., , , , , , and . IEEE Trans. Multim., 14 (6): 1515-1527 (2012)Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security., , , and . Comput. Secur., (2022)Reconciling community resource requirements in U-Nets., , , , and . U-NET@CoNEXT, page 19-24. ACM, (2009)