From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Examining the Centralization of Email Industry: A Landscape Analysis for IPv4 and IPv6., , , и . ISCC, стр. 360-366. IEEE, (2023)A deterministic approach for extracting network security intents., , , , , , , и . Comput. Networks, (2022)Refining Network Intents for Self-Driving Networks., , , и . SelfDN@SIGCOMM, стр. 15-21. ACM, (2018)SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management., , , , , , и . CNSM, стр. 1-7. IEEE, (2020)A Bottom-Up Approach for Extracting Network Intents., , , , , и . AINA, том 1151 из Advances in Intelligent Systems and Computing, стр. 858-870. Springer, (2020)Affinity measurement for NFV-enabled networks: A criteria-based approach., , , , , и . IM, стр. 125-133. IEEE, (2017)Artificial neural network model to predict affinity for virtual network functions., , , , , и . NOMS, стр. 1-9. IEEE, (2018)AI/ML for Network Security: The Emperor has no Clothes., , , , , и . CCS, стр. 1537-1551. ACM, (2022)Hosting Industry Centralization and Consolidation., , , , , и . NOMS, стр. 1-9. IEEE, (2022)DWT in P4: Periodicity Detection in the Data Plane., , , , , , и . GLOBECOM, стр. 6343-6348. IEEE, (2022)