Author of the publication

DReAM - a distributed result-aware monitor for Network Functions Virtualization.

, , , , , , and . ISCC, page 663-668. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Role-Based Access Control for CORBA Distributed Object Systems., and . WORDS, page 53-60. IEEE Computer Society, (2002)Diagnosing Memory Provisioning in IaaS Clouds., , and . SBESC, page 1-6. IEEE Computer Society, (2013)Policy control management for Web Services., , , , and . Integrated Network Management, page 49-56. IEEE, (2009)A Lightweight Intrusion-Tolerant Overlay Network., and . ISORC, page 496-503. IEEE Computer Society, (2006)The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries., , , , , and . SECRYPT, page 442-449. SCITEPRESS, (2024)A Security Scheme for Mobile Agent Platforms in Large-Scale Systems., , and . Communications and Multimedia Security, volume 2828 of Lecture Notes in Computer Science, page 104-116. Springer, (2003)Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks., , , and . ICISSP, page 21-29. SCITEPRESS, (2024)Investigating Performance and Cost in Function-as-a-Service Platforms., and . 3PGCIC, volume 96 of Lecture Notes in Networks and Systems, page 174-185. Springer, (2019)DReAM - a distributed result-aware monitor for Network Functions Virtualization., , , , , , and . ISCC, page 663-668. IEEE Computer Society, (2016)Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust., , , , and . SELMAS, volume 2940 of Lecture Notes in Computer Science, page 207-224. Springer, (2003)