Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks., and . J. Netw. Syst. Manag., 32 (2): 35 (April 2024)Machine Learning Algorithms for Preventing IoT Cybersecurity Attacks., , and . IntelliSys (3), volume 1252 of Advances in Intelligent Systems and Computing, page 679-686. Springer, (2020)Hybrid SDN evolution: A comprehensive survey of the state-of-the-art., , , , and . Comput. Networks, (2021)Machine learning based fileless malware traffic classification using image visualization., , , , , and . Cybersecur., 6 (1): 32 (December 2023)Time Inference Attacks on Software Defined Networks: Challenges and Countermeasures., and . IEEE CLOUD, page 342-349. IEEE Computer Society, (2018)Using VANET to support green vehicle communications for urban operation rescue., , , , , and . ITST, page 324-328. IEEE, (2012)White Box Analysis at the Service of Low Rate Saturation Attacks on Virtual SDN Data Plane., and . LCN Symposium, page 100-107. IEEE, (2019)Hybrid SDN Evolution: A Comprehensive Survey of the State-of-the-Art., , , , and . CoRR, (2021)Stimulus-centric versus perception-centric relations in quality of experience assessment., , and . WTS, page 1-6. IEEE, (2012)Teaching Flooding Attack to the SDN Data Plane with POGIL., , and . SIGITE, page 194-199. ACM, (2020)