From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Software Defined Monitoring (SDM) for 5G mobile backhaul networks., , , , , , и . LANMAN, стр. 1-6. IEEE, (2017)Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms., , , , , и . ICTSS, том 11812 из Lecture Notes in Computer Science, стр. 270-278. Springer, (2019)Leveraging LTE security with SDN and NFV., , , , , и . ICIIS, стр. 220-225. IEEE, (2015)A Framework for Security Monitoring of Real IoT Testbeds., , , и . ICSOFT, стр. 645-652. SCITEPRESS, (2021)Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN., , , , , и . IM, стр. 594-598. IFIP, (2019)AI4SOAR: A Security Intelligence Tool for Automated Incident Response., , , и . ARES, стр. 170:1-170:8. ACM, (2024)The SPATIAL Architecture: Design and Development Experiences from Gauging and Monitoring the AI Inference Capabilities of Modern Applications., , , , , , , , , и 21 other автор(ы). ICDCS, стр. 947-959. IEEE, (2024)An advanced approach for modeling and detecting software vulnerabilities., , , , , , и . Inf. Softw. Technol., 54 (9): 997-1013 (2012)The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service., , , , , , , , , и 4 other автор(ы). ARES, стр. 68:1-68:7. ACM, (2022)Dynamic Deployment and Monitoring of Security Policies., , , , и . TrustBus, том 9264 из Lecture Notes in Computer Science, стр. 180-192. Springer, (2015)