Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network anomaly detection and classification via opportunistic sampling., , and . IEEE Network, 23 (1): 6-12 (2009)Network virtualization over heterogeneous federated infrastructures: Data plane connectivity., , , , , , and . IM, page 26-33. IEEE, (2013)Virtual Topology Mapping in SDN-Enabled Clouds., , and . NCCA, page 62-67. IEEE Computer Society, (2014)Reputation-Based Trust in federated testbeds utilizing user experience., , , , and . CAMAD, page 56-60. IEEE, (2014)Architecture for the heterogeneous federation of Future Internet experimentation facilities., , , , , , , , , and 7 other author(s). Future Network & Mobile Summit, page 1-11. IEEE, (2013)Data fusion algorithms for network anomaly detection: classification and evaluation., , , , and . ICNS, page 50. IEEE Computer Society, (2007)Two-stage selective sampling for anomaly detection: analysis and evaluation., and . Security and Communication Networks, 4 (6): 608-621 (2011)An Architecture for Virtual Network Embedding in Wireless Systems., , , , and . NCCA, page 62-68. (2011)Leveraging SDN for Efficient Anomaly Detection and Mitigation on Legacy Networks., , and . EWSDN, page 85-90. IEEE Computer Society, (2014)Control-plane slicing methods in multi-tenant software defined networks., , , , , and . IM, page 612-618. IEEE, (2015)