Mail:
Phone:
Mobile phone:
Web page:
Latency-Sensitive Service Chaining with Isolation Constraints (MECC, 2024)
Challenges for Continuous, Provable Security Service Level Agreement Management in Computing Continuum (IEEE Access, 2024)
Keeping Verticals’ Sovereignty During Application Migration in Continuum (Journal of Network and Systems Management, 2024)
Security Constraints for Placement of Latency Sensitive 5G MEC Applications (FiCloud, 2022)
Security Context Migration in MEC: Challenges and Use Cases (Electronics, 2022)
Verticals in 5G MEC-Use Cases and Security Challenges (IEEE Access, 2021)
Towards constructive approach to end-to-end slice isolation in 5G networks (EURASIP Journal on Information Security, 2018)
On end-to-end approach for slice isolation in 5G networks. Fundamental challenges (FedCSIS, 2017)
Trustworthiness 5G Enabler (FedCSIS, 2017)