Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ALPS: The Accountable Cloud Protocol Stack., , and . CLOSER, page 467-475. SciTePress, (2014)Slow but certain wins the race: authenticated bundle communication in delay tolerant networks., , , and . Q2SWinet, page 90-97. ACM, (2010)Power management in virtualized data centers: state of the art., , , and . J. Cloud Comput., (2016)A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices., , , and . Int. J. Netw. Secur., 3 (2): 120-131 (2006)Security-Aware Node Replacements and Incremental Updates in Industrial IoT Platforms., , and . GLOBECOM, page 2002-2007. IEEE, (2022)Job Classification in Cloud Computing: The Classification Effects on Energy Efficiency., , , and . UCC, page 547-552. IEEE Computer Society, (2015)ENAGS: energy and network-aware genetic scheduling algorithm on cloud data centers., , , and . ICC, page 49:1-49:7. ACM, (2017)Paving the Way for Energy Efficient Cloud Data Centers: A Type-Aware Virtual Machine Placement Strategy., , , and . IC2E, page 5-8. IEEE Computer Society, (2017)Mitigating Rogue Node Attacks in Edge Computing., , , and . MENACOMM, page 1-6. IEEE, (2019)bwSlicer: A bandwidth slicing framework for cloud data centers., , , and . Future Gener. Comput. Syst., (2020)