Author of the publication

Security and Protection of Critical Infrastructures: A Conceptual and Regulatory Overview for Network and Information Security in the European Framework, also focusing upon the Cloud Perspective.

, , , , , , , and . EANN Workshops, page 28:1-28:10. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

e-Health Services in the Context of IoT: The Case of the VICINITY Project., , , , , , , and . AIAI (Workshops), volume 520 of IFIP Advances in Information and Communication Technology, page 62-69. Springer, (2018)Modern Video-to-Video Communications to Enhance Citizens' Quality of Life and Create Opportunities for Growth in "Smart" European Cities., , , , , , , and . AIAI Workshops, volume 437 of IFIP Advances in Information and Communication Technology, page 1-12. Springer, (2014)A 5G-Based Architecture for Localization Accuracy., , , and . AIAI Workshops, volume 652 of IFIP Advances in Information and Communication Technology, page 23-33. Springer, (2022)Developing an Innovative Multi-hop Relay Station Software Architecture in the Scope of the REWIND European Research Programme., , , , , , , and . MOBILIGHT, volume 13 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 160-172. Springer, (2009)Network Architecture and Essential Features for 5G: The SESAME Project Approach., , , , , , , , , and 3 other author(s). AIAI, volume 475 of IFIP Advances in Information and Communication Technology, page 676-685. Springer, (2016)Security Analysis of Mobile Edge Computing in Virtualized Small Cell Networks., , , , , , , , and . AIAI, volume 475 of IFIP Advances in Information and Communication Technology, page 653-665. Springer, (2016)NEMO: Building the Next Generation Meta Operating System., , , , , , , , , and 9 other author(s). eSAAM, page 1-9. ACM, (2023)Security Challenges in the eHealth Domain: The VICINITY Approach., , , , , , , and . DCOSS, page 219-223. IEEE, (2019)Introducing Mobile Edge Computing Capabilities through Distributed 5G Cloud Enabled Small Cells., , , , , , , , , and 7 other author(s). Mob. Networks Appl., 21 (4): 564-574 (2016)Putting Intelligence in the Network Edge Through NFV and Cloud Computing: The SESAME Approach., , , , , , , , , and . EANN, volume 744 of Communications in Computer and Information Science, page 704-715. Springer, (2017)