Skip to main navigation
Skip to search
Skip to main content
VTT's Research Information Portal Home
Home
Profiles
Research output
Projects
Datasets
Research units
Research Infrastructures
Activities
Prizes
Press/Media
Impacts
Search by expertise, name or affiliation
Virtualized security at the network edge : a user-centric approach
Diego Montero
, Marcelo Yannuzzi
, Adrian Shaw
, Ludovic Jacquin
, Antonio Pastor
, René Serral-Gracià
, Antonio Lioy
, Fulvio Risso
, Cataldo Basile
, Roberto Sassu
, Mario Nemirovsky
, Francesco Ciaccia
, Michael Georgiades
, Savvas Charalambides
,
Jarkko Kuusijärvi
, Francesca Bosco
Polytechnic University of Catalonia (UPC)
Hewlett-Packard Company
Telefonica Group
Politecnico di Torino
Catalan Institution for Research and Advanced Studies (ICREA)
Barcelona Supercomputing Center
Research output
:
Contribution to journal
›
Article
›
Scientific
›
peer-review
45
Citations (Scopus)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Virtualized security at the network edge : a user-centric approach'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Access Network
50%
Desktop Computer
50%
Device-centric
50%
Distinctive Features
50%
Game Console
50%
Model Protection
50%
Network Edge
100%
Network Function Virtualization
50%
Next Generation Access Networks
50%
Point of Presence
50%
Protection Level
50%
Protection Model
50%
Security Policy
50%
Security Profile
50%
Security Protection
50%
Security Threats
50%
Single User
50%
Smart TV
50%
Smartphone
50%
Telecom Operator
50%
Trusted Virtual Domain
100%
User Protection
50%
User Terminal
100%
User-centered Approach
100%
User-centric Model
50%
Virtualization
50%
Virtualized
100%
Computer Science
Access Network
100%
Desktop Computer
50%
Distinctive Feature
50%
Game Console
50%
Network Function Virtualization
50%
Paradigm Shift
50%
Point-of-Presence
50%
Security Policy
50%
Security Profile
50%
Security Protection
50%
Virtual Domain
100%
Virtualizations
50%
INIS
computers
16%
consoles
16%
devices
66%
levels
16%
policy
16%
power
16%
proliferation
16%
protection
100%
security
100%