From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Network-Based Intrusion Detection Systems Evaluation Through a Short Term Experimental Script., и . ICETE (2), стр. 54-60. INSTICC Press, (2004)On the Performance of Web Services Management Standards - An Evaluation of MUWS and WS-Management for Network Management., , , , и . Integrated Network Management, стр. 459-468. IEEE, (2007)No more backups: Toward efficient embedding of survivable virtual networks., , , , , , и . ICC, стр. 2128-2132. IEEE, (2013)A conservative strategy to protect P2P file sharing systems from pollution attacks., , , и . Concurr. Comput. Pract. Exp., 23 (1): 117-141 (2011)MUSE - An Interactive Networked Multimedia Applications Specification Environment with E-LOTOS Translator., и . CAiSE, том 1413 из Lecture Notes in Computer Science, стр. 273-287. Springer, (1998)Beyond pollution and taste: A tag-based strategy to increase download quality in P2P file sharing systems., , , и . Comput. Commun., 36 (2): 191-202 (2013)Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks., , , , и . Comput. Networks, 56 (11): 2569-2589 (2012)How physical network topologies affect virtual network embedding quality: A characterization study based on ISP and datacenter networks., , , , и . J. Netw. Comput. Appl., (2016)A toolset for efficient privacy-oriented virtual network embedding and its instantiation on SDN/OpenFlow-based substrates., , , , и . Comput. Commun., (2016)Managing Virtual Programmable Switches: Principles, Requirements, and Design Directions., , , , , , , , и . IEEE Commun. Mag., 60 (2): 53-59 (2022)