From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Requirements for Multi-operator Virtualized Network and Service Orchestration for 5G., , , , и . Guide to Security in SDN and NFV, Springer, (2017)Collateral Damage of Facebook Applications: a Comprehensive Study., , , , , и . IACR Cryptology ePrint Archive, (2018)Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions., , и . IEEE Commun. Mag., 58 (7): 72-77 (2020)Analysis of end-to-end multi-domain management and orchestration frameworks for software defined infrastructures: an architectural survey., , , , , , , , , и 12 other автор(ы). Trans. Emerg. Telecommun. Technol., (2017)Games in the Time of COVID-19: Promoting Mechanism Design for Pandemic Response., и . CoRR, (2021)Collateral damage of Facebook third-party applications: a comprehensive study., , , , , и . Comput. Secur., (2018)On pricing online data backup., и . INFOCOM Workshops, стр. 564-569. IEEE, (2015)MAIPAN - Middleware for Application Interconnection in Personal Area Networks., , , , и . MobiQuitous, стр. 494-498. IEEE Computer Society, (2005)Enablers for Energy Efficient Wireless Networks., , , , , , , , , и 1 other автор(ы). VTC Fall, стр. 1-5. IEEE, (2010)Hierarchical architecture for managed wireless networks., , и . CoNEXT, стр. 260-261. ACM, (2005)