-
1
-
-
84904486307
-
z310: Applications, enablers, challenges and directions
-
N. Bjørner and L. de Moura. z310 : Applications, enablers, challenges and directions. In CFV '09, 2009.
-
(2009)
CFV '09
-
-
Bjørner, N.1
De Moura, L.2
-
2
-
-
70350656962
-
Nox: Towards an operating system for networks
-
July
-
N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker. Nox: towards an operating system for networks. SIGCOMM Comput. Commun. Rev., 38(3):105-110, July 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.3
, pp. 105-110
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenker, S.7
-
3
-
-
68649129121
-
Openflow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. Openflow: enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev., 38.
-
SIGCOMM Comput. Commun. Rev.
, pp. 38
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
4
-
-
84865538933
-
A network in a laptop: Rapid prototyping for software-defined networks
-
New York, NY, USA, ACM
-
B. Lantz, B. Heller, and N. McKeown. A network in a laptop: rapid prototyping for software-defined networks. In Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks, Hotnets '10, pages 19:1-19:6, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks, Hotnets '10
-
-
Lantz, B.1
Heller, B.2
McKeown, N.3
-
5
-
-
84966929628
-
Adaptive use of network-centric mechanisms in cyber-defense
-
IEEE Computer Society
-
M. Atighetchi, P. Pal, F. Webber, and C. Jones. Adaptive use of network-centric mechanisms in cyber-defense. In ISORC '03, page 183. IEEE Computer Society, 2003.
-
(2003)
ISORC '03
, pp. 183
-
-
Atighetchi, M.1
Pal, P.2
Webber, F.3
Jones, C.4
-
6
-
-
84964510395
-
Dynamic approaches to thwart adversary intelligence gathering
-
vol.1
-
D. Kewley, R. Fink, J. Lowry, and M. Dean. Dynamic approaches to thwart adversary intelligence gathering. In DARPA Information Survivability Conference Exposition II, 2001. DISCEX '01. Proceedings, volume 1, pages 176-185 vol.1, 2001.
-
(2001)
DARPA Information Survivability Conference Exposition II, 2001. DISCEX '01. Proceedings
, vol.1
, pp. 176-185
-
-
Kewley, D.1
Fink, R.2
Lowry, J.3
Dean, M.4
-
7
-
-
34250345531
-
Anagnostakis. Defending against hitlist worms using network address space randomization
-
S. Antonatos, P. Akritidis, E. P. Markatos, and K. G. Anagnostakis. Defending against hitlist worms using network address space randomization. Comput. Netw., 51(12):3471-3490, 2007.
-
(2007)
Comput. Netw.
, vol.51
, Issue.12
, pp. 3471-3490
-
-
Antonatos, S.1
Akritidis, P.2
Markatos, E.P.3
G, K.4
-
8
-
-
0016047180
-
Computing partitions with applications to the knapsack problem
-
april
-
Ellis Horowitz and Sartaj Sahni. Computing partitions with applications to the knapsack problem. J. ACM, 21(2):277-292, april 1974.
-
(1974)
J. ACM
, vol.21
, Issue.2
, pp. 277-292
-
-
Horowitz, E.1
Sahni, S.2
-
9
-
-
84866493451
-
-
SRI International. Yices: An SMT Solver, 2012. http://yices.csl.sri.com/.
-
(2012)
Yices: An SMT Solver
-
-
-
10
-
-
71949086200
-
Network configuration in a box: Towards end-to-end verification of network reachability and security
-
E. Al-Shaer, W. Marrero, A. El-Atawy, and K. ElBadawi. Network configuration in a box: towards end-to-end verification of network reachability and security. In Network Protocols, 2009. ICNP 2009. 17th IEEE International Conference on, pages 123-132, 2009.
-
(2009)
Network Protocols, 2009. ICNP 2009. 17th IEEE International Conference on
, pp. 123-132
-
-
Al-Shaer, E.1
Marrero, W.2
El-Atawy, A.3
ElBadawi, K.4
-
11
-
-
84866479574
-
-
Technical Report UNCC-CYBERDNA-0728, CyberDNA Lab, University of North Carolina at Charlotte, Charlotte, NC, July
-
Ehab Al-Shaer and Qi Duan. Random host IP mutation for moving target defense. Technical Report UNCC-CYBERDNA-0728, CyberDNA Lab, University of North Carolina at Charlotte, Charlotte, NC, July 2011.
-
(2011)
Random Host IP Mutation for Moving Target Defense
-
-
Al-Shaer, E.1
Duan, Q.2
|