Author of the publication

An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions.

, , , , , , and . J. Netw. Syst. Manag., 31 (2): 39 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services., , and . J. Netw. Syst. Manag., 32 (1): 21 (March 2024)HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots., , and . NOMS, page 1-9. IEEE, (2023)Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., 14 (9): 2470-2485 (2019)An Analysis of Cloud Gaming Platforms Behavior under Different Network Constraints., , , , , and . CNSM, page 551-557. IEEE, (2021)Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN., , , , , and . IM, page 594-598. IFIP, (2019)Passive Inference of User Actions through IoT Gateway Encrypted Traffic Analysis., , and . IM, page 7-12. IFIP, (2019)An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users., , , , , , , , , and 1 other author(s). IEEE Commun. Mag., 57 (6): 33-39 (2019)VoIP Malware: Attack Tool & Attack Scenarios., , and . ICC, page 1-6. IEEE, (2009)Leveraging in-network real-value computation for home network device recognition., , , and . IM, page 734-735. IEEE, (2021)CMSec: A Vulnerability Prevention Tool for Supporting Migrations in Cloud Composite Services., , and . CloudNet, page 267-271. IEEE, (2022)