Author of the publication

Survivor: An enhanced controller placement strategy for improving SDN survivability.

, , , , and . GLOBECOM, page 1909-1915. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security-aware optimal resource allocation for virtual network embedding., , , , and . CNSM, page 378-384. IEEE, (2012)Adaptive Multimedia Applications and QoS in the MUSE Specification Environment., , and . Applied Informatics, page 258-260. IASTED/ACTA Press, (1999)Slowing down to speed up: Mitigating collusion attacks in Content Distribution Systems., , , , , and . IM, page 435-442. IEEE, (2013)Piecing together the NFV provisioning puzzle: Efficient placement and chaining of virtual network functions., , , , and . IM, page 98-106. IEEE, (2015)Limiting fake accounts in large-scale distributed systems through adaptive identity management., and . IM, page 1092-1098. IEEE, (2015)How much management is management enough? Providing monitoring processes with online adaptation and learning capability., , and . Integrated Network Management, page 299-302. IEEE, (2009)Monitoring High-Layer Protocol Behavior Using the Trace Architecture., , and . LANOMS, page 99-. UFMG, (2001)Funnel: Choking Polluters in BitTorrent File Sharing Communities., , , and . IEEE Trans. Network and Service Management, 8 (4): 310-321 (2011)Distinguished experts panel., and . NOMS, IEEE, (2008)A SNMP-based platform for distributed stateful intrusion detection in enterprise networks., , , and . IEEE Journal on Selected Areas in Communications, 23 (10): 1973-1982 (2005)