Author of the publication

An SDN/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement.

, , , , , , , , and . IEEE Communications Magazine, 55 (3): 217-223 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GLARE: A Dataset for Traffic Sign Detection in Sun Glare., , , , , , and . CoRR, (2022)High Performance Network Metadata Extraction Using P4 for ML-based Intrusion Detection Systems., , , and . HPSR, page 1-7. IEEE, (2021)Gray, Nicholas, et al. "Highlighting the Gap Between Expected and Actual Behavior in P4-enabled Networks, , , , and . IFIP/IEEE Symposium on Integrated Network and Service Management (IM), (March 2019)Bridging the Gap Between Programming and Implementation of Networking Devices, , , , and . Student Workshop of the 14th International Conference on emerging Networking EXperiments and Technologies, (December 2018)Evaluation of a Distributed Control Plane for Managing Heterogeneous SDN-enabled and Legacy Networks, , , , and . 7th International Conference on Communications and Electronics (ICCE), Hue, Vietnam, (July 2018)Browser Fingerprinting: How to Protect Machine Learning Models and Data with Differential Privacy?, , , , , and . Electronic Communications of the EASST, (2021)Browser Fingerprinting: How to Protect Machine Learning Models and Data with Differential Privacy?, , , , , and . 1st International Workshop on Machine Learning in Networking (MaLeNe) as part of NetSys'21, Lübeck, Germany (Virtual Conference), (September 2021)Social Transparency in Network Monitoring and Security Systems., , , and . MUM, page 31-47. ACM, (2023)Moving Down the Stack: Performance Evaluation of Packet Processing Technologies for Stateful Firewalls, , , , , and . NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, page 1--7. IEEE, (2023)Browser Fingerprinting: How to Protect Machine Learning Models and Data with Differential Privacy?, , , , , and . Electron. Commun. Eur. Assoc. Softw. Sci. Technol., (2022)