Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-De�?ned Networks, , , and . Proceedings of the 2013 ACM conference on Computer and communications security, New York, NY, USA, ACM, (2013)A Framework For Integrating Security Services into Software-Defined Networks, , , and . (2013)Mobility of Everything (MoE): An Integrated and Distributed Mobility Management., , , , , , and . ICCCN, page 1-11. IEEE, (2017)Rosemary: A Robust, Secure, and High-performance Network Operating System., , , , , , , , and . ACM Conference on Computer and Communications Security, page 78-89. ACM, (2014)GapFinder: Finding Inconsistency of Security Information From Unstructured Text., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Operator-Defined Reconfigurable Network OS for Software-Defined Networks., , , , , and . IEEE/ACM Trans. Netw., 27 (3): 1206-1219 (2019)AVX-TSCHA: Leaking information through AVX extensions in commercial processors., , and . Comput. Secur., (November 2023)Partitioning Ethereum without Eclipsing It., , , , and . NDSS, The Internet Society, (2023)EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation., , , and . NDSS, The Internet Society, (2022)INDAGO: A New Framework For Detecting Malicious SDN Applications., , , and . ICNP, page 220-230. IEEE Computer Society, (2018)