Francesco Palmieri
Orcid: 0000-0003-1760-5527Affiliations:
- University of Salerno, Fisciano, Italy
- Second University of Naples, Department of Industrial and Information Engineering (former)
According to our database1,
Francesco Palmieri
authored at least 269 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on publons.com
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on unisa.it
On csauthors.net:
Bibliography
2025
A distance-based network activity correlation framework for defeating anonymization overlays.
Inf. Sci., 2025
2024
Inf. Fusion, April, 2024
When explainability turns into a threat - using xAI to fool a fake news detection method.
Comput. Secur., February, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks.
IEEE Trans. Dependable Secur. Comput., 2024
Electricity consumption forecasting for sustainable smart cities using machine learning methods.
Internet Things, 2024
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles.
Internet Things, 2024
Estimating electricity consumption at city-level through advanced machine learning methods.
Connect. Sci., 2024
A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners.
Comput., 2024
An explainable model for predicting Worsening Heart Failure based on genetic programming.
Comput. Biol. Medicine, 2024
A hound-inspired pre-hybridized genetic approach for router placement in wireless mesh networks.
Appl. Soft Comput., 2024
Proceedings of the Computational Science and Its Applications - ICCSA 2024 Workshops, 2024
Proceedings of the Computational Science and Its Applications - ICCSA 2024 Workshops, 2024
Proceedings of the Computational Science and Its Applications - ICCSA 2024 Workshops, 2024
Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
2023
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains.
Future Gener. Comput. Syst., November, 2023
Enhancing COVID-19 tracking apps with human activity recognition using a deep convolutional neural network and HAR-images.
Neural Comput. Appl., July, 2023
A co-evolutionary genetic algorithm for robust and balanced controller placement in software-defined networks.
J. Netw. Comput. Appl., March, 2023
Inf., February, 2023
MLPKV: A Local Differential Multi-Layer Private Key-Value Data Collection Scheme for Edge Computing Environments.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Identifying patterns in multiple biomarkers to diagnose diabetic foot using an explainable genetic programming-based approach.
Future Gener. Comput. Syst., 2023
Raise Awareness of the Environmental Impacts of Retail Food Products: A User-Centered Scenario-Based Approach.
Proceedings of the 15th International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2023), 2023
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023
Mitigating User Exposure to Dark Patterns in Cookie Banners Through Automated Consent.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023
Proceedings of the 24th International Conference on Control Systems and Computer Science, 2023
2022
ACM Trans. Internet Techn., 2022
Maximum Network Lifetime Problem with Time Slots and coverage constraints: heuristic approaches.
J. Supercomput., 2022
A genetic programming-based approach for classifying pancreatic adenocarcinoma: the SICED experience.
Soft Comput., 2022
Soft Comput., 2022
Int. J. Intell. Syst., 2022
ACM Comput. Surv., 2022
Clust. Comput., 2022
A Galerkin Approach for Fractional Delay Differential Equations Using Hybrid Chelyshkov Basis Functions.
Proceedings of the Computational Science and Its Applications - ICCSA 2022, 2022
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
Proceedings of the Extended Reality - First International Conference, 2022
2021
A Distributed Flow Correlation Attack to Anonymizing Overlay Networks Based on Wavelet Multi-Resolution Analysis.
IEEE Trans. Dependable Secur. Comput., 2021
Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial-temporal features extraction.
J. Netw. Comput. Appl., 2021
GGA: A modified genetic algorithm with gradient-based local search for solving constrained optimization problems.
Inf. Sci., 2021
A Cluster-Based Multidimensional Approach for Detecting Attacks on Connected Vehicles.
IEEE Internet Things J., 2021
A stacked autoencoder-based convolutional and recurrent deep neural network for detecting cyberattacks in interconnected power control systems.
Int. J. Intell. Syst., 2021
CoRR, 2021
Effective classification of android malware families through dynamic features and neural networks.
Connect. Sci., 2021
Concurr. Comput. Pract. Exp., 2021
Human oriented solutions for intelligent analysis, multimedia and communication systems.
Concurr. Comput. Pract. Exp., 2021
On the undetectability of payloads generated through automatic tools: A human-oriented approach.
Concurr. Comput. Pract. Exp., 2021
Optimal control of system governed by nonlinear volterra integral and fractional derivative equations.
Comput. Appl. Math., 2021
Appl. Soft Comput., 2021
Association rule-based malware classification using common subsequences of API calls.
Appl. Soft Comput., 2021
Effectiveness of Video-Classification in Android Malware Detection Through API-Streams and CNN-LSTM Autoencoders.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
Vehicle-to-Everything (V2X) Communication Scenarios for Vehicular Ad-hoc Networking (VANET): An Overview.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
Comparison Between Protein-Protein Interaction Networks CD4<sup>+</sup>T and CD8<sup>+</sup>T and a Numerical Approach for Fractional HIV Infection of CD4<sup>+</sup>T Cells.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
Proceedings of the FRAME@HPDC 2021: Proceedings of the 1st Workshop on Flexible Resource and Application Management on the Edge, 2021
2020
IEEE Trans. Sustain. Comput., 2020
IEEE Trans. Engineering Management, 2020
Distributed Group Key Management for Event Notification Confidentiality Among Sensors.
IEEE Trans. Dependable Secur. Comput., 2020
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices.
ACM Trans. Cyber Phys. Syst., 2020
Temporal convolutional neural (TCN) network for an effective weather forecasting using time-series data from the local weather station.
Soft Comput., 2020
A machine learning evolutionary algorithm-based formula to assess tumor markers and predict lung cancer in cytologically negative pleural effusions.
Soft Comput., 2020
A genetic approach for the maximum network lifetime problem with additional operating time slot constraints.
Soft Comput., 2020
Sensors, 2020
Pattern Recognit. Lett., 2020
J. Parallel Distributed Comput., 2020
Special issue on advanced techniques for security and privacy of internet-of-things with machine learning.
J. Netw. Comput. Appl., 2020
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices.
Inf. Sci., 2020
Transformative computing approaches for advanced management solutions and cognitive processing.
Inf. Process. Manag., 2020
IEEE Internet Things J., 2020
Knowledge elicitation based on genetic programming for non destructive testing of critical aerospace systems.
Future Gener. Comput. Syst., 2020
Concurr. Comput. Pract. Exp., 2020
Comput. Networks, 2020
IEEE Access, 2020
Proceedings of the Testing Software and Systems, 2020
Proceedings of the 26th International DMS Conference on Visualization and Visual Languages, 2020
Proceedings of the Advanced Information Networking and Applications, 2020
Proceedings of the Advanced Information Networking and Applications, 2020
2019
Guest Editorial: Soft Computing Applications for Novel and Upcoming Distributed and Parallel Systems From Cloud Computing and Beyond.
IEEE Trans. Ind. Informatics, 2019
Sensors, 2019
Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios.
J. Syst. Archit., 2019
MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks.
J. Netw. Comput. Appl., 2019
Network anomaly detection based on logistic regression of nonlinear chaotic invariants.
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
Inf. Sci., 2019
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection.
Inf. Sci., 2019
A data-driven approximate dynamic programming approach based on association rule learning: Spacecraft autonomy as a case study.
Inf. Sci., 2019
Inf. Sci., 2019
A study on forecasting electricity production and consumption in smart cities and factories.
Int. J. Inf. Manag., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
CoRR, 2019
Proceedings of the 4th International Conference on System Reliability and Safety, 2019
A Scheduling Framework for Latency Optimization on 5G Mobile Edge Computing Infrastructures.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
2018
Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures.
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Dependable Secur. Comput., 2018
Secur. Commun. Networks, 2018
A scalable distributed machine learning approach for attack detection in edge computing environments.
J. Parallel Distributed Comput., 2018
J. Parallel Distributed Comput., 2018
Distributed strategic learning and game theoretic formulation of network embedded coding.
J. Comput. Sci., 2018
J. Netw. Comput. Appl., 2018
Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence.
IEEE Internet Things J., 2018
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes.
Future Gener. Comput. Syst., 2018
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation.
Future Gener. Comput. Syst., 2018
On the optimal tuning and placement of FEC codecs within multicasting trees for resilient publish/subscribe services in edge-IoT architectures.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms.
Concurr. Comput. Pract. Exp., 2018
Comput. Secur., 2018
Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT.
Comput. Secur., 2018
Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition.
Comput. Secur., 2018
IEEE Commun. Mag., 2018
IEEE Cloud Comput., 2018
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018
Proceedings of the Augmented Reality, Virtual Reality, and Computer Graphics, 2018
2017
IEEE Trans. Sustain. Comput., 2017
ACM Trans. Embed. Comput. Syst., 2017
Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification.
Soft Comput., 2017
A Multiobjective Wavelength Routing Approach Combining Network and Traffic Engineering With Energy Awareness.
IEEE Syst. J., 2017
Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks.
IEEE Syst. J., 2017
Non-deterministic security driven meta scheduler for distributed cloud organizations.
Simul. Model. Pract. Theory, 2017
A wave propagation-based adaptive probabilistic broadcast containment strategy for reactive MANET routing protocols.
Pervasive Mob. Comput., 2017
J. Comput. Sci., 2017
Inf. Sci., 2017
Inf. Sci., 2017
Int. J. Found. Comput. Sci., 2017
Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design.
Future Gener. Comput. Syst., 2017
Improving the gossiping effectiveness with distributed strategic learning (Invited paper).
Future Gener. Comput. Syst., 2017
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants.
Future Gener. Comput. Syst., 2017
IEEE Commun. Mag., 2017
Appl. Soft Comput., 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
2016
Proceedings of the Resource Management for Big Data Platforms, 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Ind. Electron., 2016
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory.
IEEE Trans. Computers, 2016
Secur. Commun. Networks, 2016
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment.
Int. J. Data Warehous. Min., 2016
GRASP-based resource re-optimization for effective big data access in federated clouds.
Future Gener. Comput. Syst., 2016
Concurr. Comput. Pract. Exp., 2016
A hybrid load-balancing and energy-aware RWA algorithm for telecommunication networks.
Comput. Commun., 2016
IEEE Cloud Comput., 2016
A cloud-based architecture for emergency management and first responders localization in smart city environments.
Comput. Electr. Eng., 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
A triadic closure and homophily-based recommendation system for online social networks.
World Wide Web, 2015
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures.
J. Supercomput., 2015
Pervasive Mob. Comput., 2015
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing.
Knowl. Based Syst., 2015
Energy efficiency of elastic frequency grids in multilayer IP/MPLS-over-flexgrid networks.
J. Netw. Comput. Appl., 2015
Modeling energy-efficient secure communications in multi-mode wireless mobile devices.
J. Comput. Syst. Sci., 2015
Cloud-based adaptive compression and secure management services for 3D healthcare data.
Future Gener. Comput. Syst., 2015
Trans. Emerg. Telecommun. Technol., 2015
Concurr. Comput. Pract. Exp., 2015
Appl. Soft Comput., 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
J. Supercomput., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Pers. Ubiquitous Comput., 2014
J. Netw. Comput. Appl., 2014
J. High Speed Networks, 2014
J. Ambient Intell. Humaniz. Comput., 2014
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems.
Int. J. Parallel Program., 2014
Int. J. Distributed Sens. Networks, 2014
Future Gener. Comput. Syst., 2014
A distributed approach to network anomaly detection based on independent component analysis.
Concurr. Comput. Pract. Exp., 2014
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Telecommun. Syst., 2013
Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources.
Math. Comput. Model., 2013
J. Ambient Intell. Humaniz. Comput., 2013
Neurocomputing, 2013
A distributed scheduling framework based on selfish autonomous agents for federated cloud environments.
Future Gener. Comput. Syst., 2013
Scalable service discovery in ubiquitous and pervasive computing architectures: A percolation-driven approach.
Future Gener. Comput. Syst., 2013
Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks.
Comput. Sci. Inf. Syst., 2013
Clust. Comput., 2013
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines.
Appl. Soft Comput., 2013
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Energy Efficiency in Large Scale Distributed Systems, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Selfish routing and wavelength assignment strategies with advance reservation in inter-domain optical networks.
Comput. Commun., 2012
An energy-aware dynamic RWA framework for next-generation wavelength-routed networks.
Comput. Networks, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
Mob. Inf. Syst., 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the First International Conference on Data Compression, 2011
Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area.
Proceedings of the 2011 International Conference on Broadband, 2011
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
2010
Proceedings of the Cloud Computing, Principles, Systems and Applications, 2010
Constrained minimum lightpath affinity routing in multi-layer optical transport networks.
J. High Speed Networks, 2010
Towards a federated Metropolitan Area Grid environment: The SCoPE network-aware infrastructure.
Future Gener. Comput. Syst., 2010
A GRASP-based network re-optimization strategy for improving RWA in multi-constrained optical transport infrastructures.
Comput. Commun., 2010
A Fault Avoidance Strategy Improving the Reliability of the EGI Production Grid Infrastructure.
Proceedings of the Principles of Distributed Systems - 14th International Conference, 2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
A Wide Area Network Optimization Service for Effective Access to Heterogeneous DataGrid Infrastructures.
Proceedings of the Data Management in Grid and Peer-to-Peer Systmes, 2010
Proceedings of the E-Commerce and Web Technologies, 11th International Conference, 2010
An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
Proceedings of the Broadband Communications, Networks, and Systems, 2010
2009
J. Networks, 2009
Network-aware scheduling for real-time execution support in data-intensive optical Grids.
Future Gener. Comput. Syst., 2009
Comput. Secur., 2009
Comput. Networks, 2009
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
Proceedings of the IP Operations and Management, 9th IEEE International Workshop, 2009
Proceedings of the Networks for Grid Applications, 2009
2008
A Minimum Cut Interference-based Integrated RWA Algorithm for Multi-constrained Optical Transport Networks.
J. Netw. Syst. Manag., 2008
Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace.
Int. J. Netw. Secur., 2008
Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies.
Comput. Secur., 2008
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008
2007
Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures.
J. Comput., 2007
Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system.
Int. J. Wirel. Mob. Comput., 2007
2006
GMPLS-based service differentiation for scalable QoS support in all-optical Grid applications.
Future Gener. Comput. Syst., 2006
A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
2005
An MPLS-based architecture for scalable QoS and traffic engineering in converged multiservice mobile IP networks.
Comput. Networks, 2005
Evaluating Evolutionary IP-Based Transport Services on a Dark Fiber Large-Scale Network Testbed.
Proceedings of the Networking, 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the High Performance Computing and Communications, 2005
2004
An High Performance Traffic Engineering Model for All-Optical Networks - Evolutionary GMPLS Control Plane Services in All-Optical Cross-Connects.
Proceedings of the ICETE 2004, 2004
Proceedings of the Computational Science and Its Applications, 2004
MPLS DiffServ-Enabled Traffic Engineering: A Scalable QoS Model for Optical-Speed Media Streaming Networks.
Proceedings of the High Speed Networks and Multimedia Communications, 2004
2003
Introducing MPLS in Mobile Data Networks: An High Performance Framework for QoS-Powered IP Mobility.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003
VPN scalability over high performance backbones Evaluating MPLS VPN against traditional approaches.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003