Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A semantic approach for comparing Fog Service Placement Problems., , , , and . IM, page 682-686. IEEE, (2021)TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum., , , , and . NetSoft, page 321-329. IEEE, (2022)From MMU to MPU: adaptation of the Pip kernel to constrained devices., , and . CoRR, (2023)Modeling the accountability and liability aspects of a 5G multi-domain on-demand security services: an unexpected journey., and . 6GNet, page 1-4. IEEE, (2022)Demonstrating Liability and Trust Metrics for Multi-Actor, Dynamic Edge and Cloud Microservices., , , , , , , and . MobiCom, page 115:1-115:3. ACM, (2023)Nested compartmentalisation for constrained devices., , and . FiCloud, page 334-341. IEEE, (2021)Root Cause and Liability Analysis in the Microservices Architecture for Edge IoT Services., , , , and . ICC, page 3277-3283. IEEE, (2023)Placement optimization of IoT security solutions for edge computing based on graph theory., , , , and . IPCCC, page 1-7. IEEE, (2019)Liability-Aware Security Management for 5G., , , , , , and . 5G World Forum, page 133-138. IEEE, (2020)Applied graph theory to security: A qualitative placement of security solutions within IoT networks., , , , and . J. Inf. Secur. Appl., (2020)