Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A deterministic approach for extracting network security intents., , , , , , , and . Comput. Networks, (2022)Examining the Centralization of Email Industry: A Landscape Analysis for IPv4 and IPv6., , , and . ISCC, page 360-366. IEEE, (2023)Refining Network Intents for Self-Driving Networks., , , and . SelfDN@SIGCOMM, page 15-21. ACM, (2018)AI/ML for Network Security: The Emperor has no Clothes., , , , , and . CCS, page 1537-1551. ACM, (2022)DWT in P4: Periodicity Detection in the Data Plane., , , , , , and . GLOBECOM, page 6343-6348. IEEE, (2022)Hosting Industry Centralization and Consolidation., , , , , and . NOMS, page 1-9. IEEE, (2022)Guiltiness: A practical approach for quantifying virtual network functions performance., , , , , , , and . Comput. Networks, (2019)ShadowFS: Speeding-up Data Plane Monitoring and Telemetry using P4., , , , , , and . ICC, page 1-6. IEEE, (2020)Predicting Elephant Flows in Internet Exchange Point Programmable Networks., , , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 485-497. Springer, (2019)Refining Network Intents for Self-Driving Networks., , , and . CoRR, (2020)