Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survey on Multi-Access Edge Computing for Internet of Things Realization., , , , and . CoRR, (2018)Overview of 5G Security Challenges and Solutions., , , , , and . IEEE Commun. Stand. Mag., 2 (1): 36-43 (2018)Enhancing Security of Software Defined Mobile Networks., , , , , , , , , and . IEEE Access, (2017)Reinforcement Learning based Cloud and Edge Resource Allocation for Real-Time Telemedicine., , , , , , and . ISMICT, page 1-6. IEEE, (2023)5G security: Analysis of threats and solutions., , , , , and . CSCN, page 193-199. IEEE, (2017)Secure Virtual Private LAN Services: An overview with performance evaluation., , , and . ICC Workshops, page 2231-2237. IEEE, (2015)SDN Enhanced Resource Orchestration of Containerized Edge Applications for Industrial IoT., , , , and . IEEE Access, (2020)Security for 5G and Beyond., , , , , and . IEEE Commun. Surv. Tutorials, 21 (4): 3682-3722 (2019)Software Defined Monitoring (SDM) for 5G mobile backhaul networks., , , , , , and . LANMAN, page 1-6. IEEE, (2017)SDN-Enabled Resource Orchestration for Industrial IoT in Collaborative Edge-Cloud Networks., , , , , , and . IEEE Access, (2021)