Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing 5G VPN+ Transport Networks with Vector Packet Processing and FPGA Cryptographic Offloading., , , , , and . MobiWIS, volume 12814 of Lecture Notes in Computer Science, page 85-98. Springer, (2021)Improving Cellular IoT Security with Identity Federation and Anomaly Detection., , , , , and . ICCCS, page 776-780. IEEE, (2020)Cross-Federation Identities for IoT Devices in Cellular Networks., , , , , and . ETFA, page 1745-1751. IEEE, (2019)Detection of DNS Tunneling in Mobile Networks Using Machine Learning., , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 221-230. Springer, (2017)Bringing 5G Into User's Smart Home., , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 782-787. IEEE, (2019)Towards a Standardized Identity Federation for Internet of Things in 5G Networks., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 2082-2088. IEEE, (2018)Authentication in a Multi-access IMS Environment., , , , , and . WiMob, page 613-618. IEEE Computer Society, (2008)Secure 5G Network Slicing for Elderly Care., , , , , , and . MobiWIS, volume 11673 of Lecture Notes in Computer Science, page 202-213. Springer, (2019)Anomaly Detection in Cellular IoT with Machine Learning., , , , , , and . GOODTECHS, volume 401 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 51-64. Springer, (2021)Thunderbolt-3 Backbone for Augmented 5G Network Slicing in Cloud-Radio Access Networks., , , , , and . 5G World Forum, page 415-420. IEEE, (2019)