Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An SDN-based approach to enhance the end-to-end security: SSL/TLS case study., , , and . NOMS, page 281-288. IEEE, (2016)State of the Art in Enablers for Applications in Future Mobile Wireless Internet, , , , , , , , and . HIIT Publication, 2004-2. Helsinki Institute for Information Technology, Helsinki, Finland, (September 2004)Techno-economic feasibility analysis of constrained application protocol., , and . WF-IoT, page 153-158. IEEE Computer Society, (2014)Device group management in constrained networks., , , and . PerCom Workshops, page 1-6. IEEE Computer Society, (2016)Power consumption in remote gaming: An empirical evaluation., , , , and . INFOCOM Workshops, page 736-741. IEEE, (2016)Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles., , and . NordSec, volume 7127 of Lecture Notes in Computer Science, page 33-48. Springer, (2010)Hypervisors vs. Lightweight Virtualization: A Performance Comparison., , and . IC2E, page 386-393. IEEE Computer Society, (2015)Anatomy of the connecting architecture of Internet of Things., , , , and . CCIS, page 1230-1234. IEEE, (2012)Benchmarking Q-Learning Methods for Intelligent Network Orchestration in the Edge., , , , , , , , , and . 6G SUMMIT, page 1-5. IEEE, (2020)Benchmarking of Emulated Wireless Edge Cloud Connectivity for Maritime Environments., , , , , , and . WF-IoT, page 1-6. IEEE, (2022)