Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threat detection and mitigation with MonB5G components in the aLTEr scenario., , and . MeditCom, page 1-2. IEEE, (2021)MonB5G: AI/ML-Capable Distributed Orchestration and Management Framework for Network Slices., , , , , , , , , and 2 other author(s). MeditCom, page 29-34. IEEE, (2021)Impacts of Service Decomposition Models on Security Attributes: A Case Study with 5G Network Repository Function., , , and . NetSoft, page 470-476. IEEE, (2021)Managing Secure Inter-slice Communication in 5G Network Slice Chains., , , , , and . DBSec, volume 12122 of Lecture Notes in Computer Science, page 24-41. Springer, (2020)KRS: Kubernetes Resource Scheduler for resilient NFV networks., , and . GLOBECOM, page 1-6. IEEE, (2021)A network tomography approach for anomaly localization in Service Function Chaining., , , and . ISNCC, page 1-6. IEEE, (2021)VNF placement algorithms to address the mono-and multi-tenant issues in edge and core networks., , , , and . CloudNet, page 1-6. IEEE, (2019)Arbitration Among Vertical Services., , , , , , , , and . PIMRC, page 153-157. IEEE, (2018)Formalization of a security access control model for the 5G system., , , , , and . NOF, page 150-158. IEEE, (2020)Optimization of Network Services Embedding Costs over Public and Private Clouds., , , , and . ICOIN, page 360-365. IEEE, (2020)