Author of the publication

POSTER: Finding Vulnerabilities in P4 Programs with Assertion-based Verification.

, , , and . CCS, page 2495-2497. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification of P4 programs in feasible time using assertions., , , and . CoNEXT, page 73-85. ACM, (2018)IoNCloud: Exploring application affinity to improve utilization and predictability in datacenters., , , , , , and . ICC, page 5497-5503. IEEE, (2015)PredCloud: Providing predictable network performance in large-scale OpenFlow-enabled cloud platforms through trust-based allocation of resources., , , , and . Comput. Commun., (2016)VANET simulators: an updated review., , and . J. Braz. Comput. Soc., 27 (1): 8 (2021)Characterizing network performance of single-node large-scale container deployments., , , and . CloudNet, page 97-103. IEEE, (2021)Optimal Service Function Chain Composition in Network Functions Virtualization., , , , , , , , and . AIMS, volume 10356 of Lecture Notes in Computer Science, page 62-76. Springer, (2017)POSTER: Finding Vulnerabilities in P4 Programs with Assertion-based Verification., , , and . CCS, page 2495-2497. ACM, (2017)Raptor: rapid prototyping of distributed stream processing applications at scale., , and . CoNEXT, page 485-486. ACM, (2021)POSTER: Accelerating Encrypted Data Stores Using Programmable Switches., , and . ICNP, page 1-2. IEEE, (2020)DoS-resilient virtual networks through multipath embedding and opportunistic recovery., , , , , , and . SAC, page 597-602. ACM, (2013)