메뉴 건너뛰기




Volumn , Issue , 2013, Pages 415-419

Adversarial VNet embeddings: A threat for ISPs?

Author keywords

[No Author keywords available]

Indexed keywords

ARBITRARY GRAPHS; ASYMPTOTICALLY OPTIMAL; CACTUS GRAPHS; EMBEDDINGS; LOWER BOUNDS; SECURITY THREATS; VIRTUAL NETWORK EMBEDDING; VIRTUAL NETWORKS;

EID: 84883080815     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2013.6566806     Document Type: Conference Paper
Times cited : (10)

References (9)
  • 1
    • 84880922188 scopus 로고    scopus 로고
    • Topology discovery of sparse random graphs with few participants
    • A. Anandkumar, A. Hassidim, and J. Kelner. Topology discovery of sparse random graphs with few participants. In Proc. SIGMETRICS, 2011.
    • (2011) Proc. SIGMETRICS
    • Anandkumar, A.1    Hassidim, A.2    Kelner, J.3
  • 3
    • 84874249801 scopus 로고    scopus 로고
    • Competitive and deterministic embeddings of virtual networks
    • G. Even, M. Medina, G. Schaffrath, and S. Schmid. Competitive and deterministic embeddings of virtual networks. In Proc. ICDCN, 2012.
    • (2012) Proc. ICDCN
    • Even, G.1    Medina, M.2    Schaffrath, G.3    Schmid, S.4
  • 4
    • 84883108521 scopus 로고    scopus 로고
    • Misleading stars: What cannot be measured in the internet?
    • Y. A. Pignolet, G. Tredan, and S. Schmid. Misleading stars: What cannot be measured in the internet? In Proc. DISC, 2011.
    • (2011) Proc. DISC
    • Pignolet, Y.A.1    Tredan, G.2    Schmid, S.3
  • 5
    • 84972130012 scopus 로고
    • How to obtain an asymptotic expansion of a sequence from an analytic identity satisfied by its generating function
    • J. M. Plotkin and J. W. Rosenthal. How to obtain an asymptotic expansion of a sequence from an analytic identity satisfied by its generating function. J. Austral. Math. Soc. Ser. A, 1994.
    • (1994) J. Austral. Math. Soc. Ser. A
    • Plotkin, J.M.1    Rosenthal, J.W.2
  • 6
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proc. 16th ACM CCS, pages 199-212, 2009.
    • (2009) Proc. 16th ACM CCS , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 9
    • 84861630515 scopus 로고    scopus 로고
    • An opportunistic resource sharing and topology-aware mapping framework for virtual networks
    • S. Zhang, Z. Qian, J. Wu, and S. Lu. An opportunistic resource sharing and topology-aware mapping framework for virtual networks. In Proc. IEEE INFOCOM, 2012.
    • (2012) Proc IEEE INFOCOM
    • Zhang, S.1    Qian, Z.2    Wu, J.3    Lu, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.