Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Edge computing for interactive media and video streaming., and . FMEC, page 68-73. IEEE, (2017)Security Services Using Blockchains: A State of the Art Survey., , , , and . CoRR, (2018)When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis., , , and . CoRR, (2018)Exploring Micro-Services for Enhancing Internet QoS., , , , and . CoRR, (2019)Fault and Performance Management in Multi-Cloud Based NFV using Shallow and Deep Predictive Structures., , , , , and . CoRR, (2019)SAIS: Smartphone Augmented Infrastructure Sensing for Public Safety and Sustainability in Smart Cities., , , , , , and . EMASC@MM, page 3-8. ACM, (2014)Paceline: latency management through adaptive output., , and . MMSys, page 181-192. ACM, (2010)Important Complexity Reduction of Random Forest in Multi-Classification Problem., , and . IWCMC, page 226-231. IEEE, (2019)Anonymity and Privacy in Bitcoin Escrow Trades., , , , and . WPES@CCS, page 211-220. ACM, (2019)A Combined Decision for Secure Cloud Computing Based on Machine Learning and Past Information., , and . WCNC, page 1-6. IEEE, (2019)