Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The (in)security of Topology Discovery in Software Defined Networks., , and . LCN, page 502-505. IEEE Computer Society, (2015)SCOR: Constraint Programming-based Northbound Interface for SDN., , and . ITNAC, page 83-88. IEEE Computer Society, (2016)R2Lab Testbed Evaluation for Wireless Mesh Network Experiments., , , , , and . ITNAC, page 1-6. IEEE Computer Society, (2018)Evaluation of Mininet-WiFi integration via ns-3., , and . ITNAC, page 243-248. IEEE Computer Society, (2016)Link capacity estimation in wireless software defined networks., , and . ITNAC, page 208-213. IEEE Computer Society, (2015)Link capacity estimation in SDN-based end-hosts., , , and . ICSPCS, page 1-8. IEEE, (2016)Towards Software Defined Wireless Mesh Networks. University of Queensland, Australia, (2017)An Efficient Method for Detecting Misbehaving Zone Manager in MANET., , and . FGIT-FGCN (2), volume 120 of Communications in Computer and Information Science, page 11-21. Springer, (2010)Securing ARP in Software Defined Networks., , , and . LCN, page 523-526. IEEE Computer Society, (2016)Demo: Using nepi-ng for Mesh Networks Experiments., , , , , and . WiNTECH, page 66-67. ACM, (2018)