Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A techno-economie study of network coding protection schemes., , , , , , , and . GLOBECOM, page 2148-2153. IEEE, (2014)A survey and taxonomy of ID/Locator Split Architectures., , , , , and . Computer Networks, (2014)A survey on the recent efforts of the Internet Standardization Body for securing inter-domain routing., , , , and . Computer Networks, (2015)Definition and Evaluation of Latency in 5G: A Framework Approach., , , , , , , , and . 5G World Forum, page 135-140. IEEE, (2019)Route leak detection using real-time analytics on local BGP information., , , , , and . GLOBECOM, page 1942-1948. IEEE, (2014)Self-reliant detection of route leaks in inter-domain routing., , , and . Computer Networks, (2015)Route leak identification: A step toward making inter-domain routing more reliable., , , , and . DRCN, page 1-8. IEEE, (2014)Improving reliability in multi-layer networks with Network Coding Protection., , , , , , and . ONDM, page 240-245. IEEE, (2014)Securing the LISP map registration process., , , , and . GLOBECOM, page 2145-2151. IEEE, (2013)TEFIS: A single access point for conducting multifaceted experiments on heterogeneous test facilities., , , , , , , , , and 16 other author(s). Computer Networks, (2014)