Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting., , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 588-614. Springer, (2015)Information Aggregation and Optimized Actuation in Sensor Networks: Enabling Smart Electrical Grids., , , and . INFOCOM, page 2386-2390. IEEE, (2007)Security for the cloud infrastructure: Trusted virtual data center implementation., , , , , , , , , and 2 other author(s). IBM J. Res. Dev., 53 (4): 6 (2009)Security intelligence for cloud management infrastructures., , , , , , , , and . IBM J. Res. Dev., 60 (4): 11 (2016)Distributed route computation and provisioning in shared mesh optical networks., , , , , and . IEEE J. Sel. Areas Commun., 22 (9): 1626-1639 (2004)A Framework for Policy-based Admission Control., , and . RFC, (January 2000)Extending OSPF routing protocol for shared mesh restoration., , , , , and . LANMAN, page 97-101. IEEE, (2004)Scalable integrity monitoring in virtualized environments., , , and . STC@CCS, page 73-78. ACM, (2010)Virtual path bandwidth allocation in multiuser networks., , and . IEEE/ACM Trans. Netw., 5 (6): 861-871 (1997)An Adaptive Virtual Path Allocation Policy for Broadband Networks., , and . INFOCOM, page 329-336. IEEE Computer Society, (1996)