Mail:
Phone:
Mobile phone:
Web page:
Verticals in 5G MEC-Use Cases and Security Challenges (IEEE Access, 2021)
Towards constructive approach to end-to-end slice isolation in 5G networks (EURASIP Journal on Information Security, 2018)
Trustworthiness 5G Enabler (FedCSIS, 2017)
On end-to-end approach for slice isolation in 5G networks. Fundamental challenges (FedCSIS, 2017)