Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-Feature DDoS Detection Schema on P4 Network Hardware., , and . ICIN, page 1-6. IEEE, (2020)Orchestrating DDoS mitigation via blockchain-based network provider collaborations., , , , , , , , and . Knowl. Eng. Rev., (2020)Automated Distribution of Access Control Rules in Defense Layers of an Enterprise Network., , , and . IM, page 735-736. IFIP, (2019)SYN Flood Attack Detection and Mitigation using Machine Learning Traffic Classification and Programmable Data Plane Filtering., , and . ICIN, page 126-133. IEEE, (2021)Deploying SDN in GÉANT production network., , , , , , , , , and . NFV-SDN, page 1-2. IEEE, (2017)Signature-Based Traffic Classification and Mitigation for DDoS Attacks Using Programmable Network Data Planes., , and . IEEE Access, (2021)Mitigation of Multi-vector Network Attacks via Orchestration of Distributed Rule Placement., , , and . IM, page 162-170. IFIP, (2019)A Privacy-Preserving Schema for the Detection and Collaborative Mitigation of DNS Water Torture Attacks in Cloud Infrastructures., , , , and . CloudNet, page 1-6. IEEE, (2019)NFV-compliant Traffic Monitoring and Anomaly Detection based on Dispersed Vantage Points in Shared Network Infrastructures., , , , and . NetSoft, page 197-201. IEEE, (2018)