Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deceiving Post-Hoc Explainable AI (XAI) Methods in Network Intrusion Detection., , , and . CCNC, page 107-112. IEEE, (2024)Real-time monitoring of SDN networks using non-invasive cloud-based logging platforms., , , , and . PIMRC, page 1-6. IEEE, (2016)A Survey on XAI for Beyond 5G Security: Technical Aspects, Use Cases, Challenges and Research Directions., , , , , , and . CoRR, (2022)OpenFlow based VoIP QoE monitoring in enterprise SDN., , , and . IM, page 660-663. IEEE, (2017)Need of 6G for the Metaverse Realization., , , , , , and . CoRR, (2023)A Survey on Privacy for B5G/6G: New Privacy Goals, Challenges, and Research Directions., , , , and . CoRR, (2022)DROAD: Demand-aware reconfigurable optically-switched agile data center network., , , , and . Opt. Switch. Netw., (2022)A Survey on Privacy of Personal and Non-Personal Data in B5G/6G Networks., , , , and . CoRR, (2022)A survey on privacy for B5G/6G: New privacy challenges, and research directions., , , , and . J. Ind. Inf. Integr., (2022)FlowVista: Low-bandwidth SDN monitoring driven by business application interaction., , and . SoftCOM, page 1-6. IEEE, (2017)