Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Global Communications Newsletter., , , , , , , , , and . IEEE Communications Magazine, 56 (12): 7-10 (2018)Deep learning for encrypted traffic classification in the face of data drift: An empirical study., , , , , , , and . Comput. Networks, (April 2023)Editorial for Special Issue on Machine Learning approaches in IoT scenarios., , , and . Comput. Commun., (2022)Re-Architecting NFV Ecosystem with Microservices: State of the Art and Research Challenges., , , and . IEEE Netw., 33 (3): 168-176 (2019)Uncovering Lateral Movement Using Authentication Logs., , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (1): 1049-1063 (2021)A First Look at Generating Website Fingerprinting Attacks via Neural Architecture Search., , , , and . WPES@CCS, page 173-178. ACM, (2023)Host in Danger? Detecting Network Intrusions from Authentication Logs., , , , , and . CNSM, page 1-9. IEEE, (2019)Series Editorial: Network Softwarization and Management., , , and . IEEE Commun. Mag., 61 (11): 182-183 (November 2023)BotChase: Graph-Based Bot Detection Using Machine Learning., , , and . IEEE Trans. Netw. Serv. Manag., 17 (1): 15-29 (2020)ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning., , , , and . NOMS, page 1-9. IEEE, (2020)