Author of the publication

Software-defined networking security: pros and cons.

, , , and . IEEE Communications Magazine, 53 (6-Supplement): 73-79 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hamdaoui, Bechir
add a person with the name Hamdaoui, Bechir
 

Other publications of authors with the same name

Software-defined networking security: pros and cons., , , and . IEEE Communications Magazine, 53 (6-Supplement): 73-79 (2015)Enabling Smart Cloud Services Through Remote Sensing: An Internet of Everything Enabler., , , and . IEEE Internet of Things Journal, 1 (3): 276-288 (2014)Lifetime-throughput tradeoff for elastic traffic in multi-hop hotspot networks., and . GLOBECOM, page 1565-1569. IEEE, (2004)Delay performance modeling and analysis in clustered cognitive radio networks., and . GLOBECOM, page 193-198. IEEE, (2014)BIRD-VNE: Backtrack-avoidance virtual network embedding in polynomial time., , and . GLOBECOM, page 4983-4989. IEEE, (2014)Rate feasibility under medium access contention constraints., and . GLOBECOM, page 3020-3024. IEEE, (2003)Power allocation analysis for dynamic power utility in cognitive radio systems., , , and . ICC, page 3732-3737. IEEE, (2015)Distributed resource and service management for large-scale dynamic spectrum access systems through coordinated learning., and . IWCMC, page 522-527. IEEE, (2011)An admission control heuristic for IEEE 802.11e wireless LANs., , and . PIMRC, page 1473-1478. IEEE, (2005)Dynamic power pricing using distributed resource allocation for large-scale DSA systems., , , and . WCNC, page 1090-1094. IEEE, (2015)