Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User-Centric Security and Dependability in the Clouds-of-Clouds., , , , , , , , , and . IEEE Cloud Comput., 3 (5): 64-75 (2016)ANCHOR: Logically Centralized Security for Software-Defined Networks., , , and . ACM Trans. Priv. Secur., 22 (2): 8:1-8:36 (2019)Software-Defined Networking: A Comprehensive Survey., , , , , and . CoRR, (2014)The KISS principle in Software-Defined Networking: An architecture for Keeping It Simple and Secure., , , and . CoRR, (2017)Software-Defined Networking: A Comprehensive Survey., , , , , and . Proc. IEEE, 103 (1): 14-76 (2015)On the Design of Practical Fault-Tolerant SDN Controllers., , , and . EWSDN, page 73-78. IEEE Computer Society, (2014)Towards generic traffic change detection in the data plane., , and . StudentWorkshop@CoNEXT, page 9-10. ACM, (2021)On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds., , , , , and . SRDS, page 448-453. IEEE Computer Society, (2012)FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications., , , , , and . NDSS, The Internet Society, (2021)Generic change detection (almost entirely) in the dataplane., , and . ANCS, page 113-120. ACM, (2021)