Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communication for Goal Directed Agents., , and . Communication in Multiagent Systems, volume 2650 of Lecture Notes in Computer Science, page 239-252. Springer, (2003)Using the Network Description Language in Optical Networks., , , , and . Integrated Network Management, page 199-205. IEEE, (2007)A distributed topology information system for optical networks based on the semantic web., , , , , and . Opt. Switch. Netw., 5 (2-3): 85-93 (2008)Ethics and Internet Measurements.. IEEE Symposium on Security and Privacy Workshops, page 247-251. IEEE Computer Society, (2017)Towards an Infrastructure Description Language for Modeling Computing Infrastructures., , , and . ISPA, page 207-214. IEEE Computer Society, (2012)On-demand provisioning of Cloud and Grid based infrastructure services for collaborative projects and groups., , , , , and . CTS, page 134-142. IEEE, (2011)Ethics and Internet Measurements., and . J. Cyber Secur. Mobil., 5 (4): 287-308 (2016)A semantic-web approach for modeling computing infrastructures., , , , , , and . Comput. Electr. Eng., 39 (8): 2553-2565 (2013)Rpkiller: Threat Analysis from an RPKI Relying Party Perspective., , and . CoRR, (2022)Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks., , , , , , and . RAID, page 263-275. ACM, (2022)