-
1
-
-
84883660828
-
-
2012 Cloud Networking Report. http://www.webtorials.com/content/2012/11/ 2012-cloud-networking-report.html.
-
(2012)
Cloud Networking Report
-
-
-
2
-
-
84883702921
-
-
ONF Expands Scope
-
ONF Expands Scope; Drives Technical Work Forward. https://www. opennetworking.org/media/press-releases/564-onf-expands-scope-drives-technical- work-forward.
-
Drives Technical Work Forward
-
-
-
3
-
-
83455259548
-
Flow processing and the rise of commodity network hardware
-
Apr.
-
A. Greenlagh et al. Flow Processing and the Rise of Commodity Network Hardware. ACM CCR, Apr. 2009.
-
(2009)
ACM CCR
-
-
Greenlagh, A.1
-
5
-
-
77956035216
-
IP options are not an option
-
University of California, Berkeley, Dec
-
R. Fonseca, G. M. Porter, R. H. Katz, S. Shenker, and I. Stoica. IP options are not an option. Technical Report UCB/EECS-2005-24, EECS Department, University of California, Berkeley, Dec 2005.
-
(2005)
Technical Report UCB/EECS-2005-24, EECS Department
-
-
Fonseca, R.1
Porter, G.M.2
Katz, R.H.3
Shenker, S.4
Stoica, I.5
-
6
-
-
84870378856
-
Stratos: Virtual middleboxes as first-class entities
-
A. Gember et al. Stratos: Virtual Middleboxes as First-Class Entities. UW-Madison TR1771, 2012.
-
(2012)
UW-Madison TR1771
-
-
Gember, A.1
-
11
-
-
84876128556
-
Is it still possible to extend TCP?
-
M. Honda et al. Is it still possible to extend TCP? In Proc. IMC, 2011.
-
(2011)
Proc. IMC
-
-
Honda, M.1
-
15
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proc. NDSS, 2005.
-
(2005)
Proc. NDSS
-
-
Newsome, J.1
Song, D.2
-
16
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: A system for detecting network intruders in real-time. In Computer Networks, pages 2435-2463, 1999.
-
(1999)
Computer Networks
, pp. 2435-2463
-
-
Paxson, V.1
-
17
-
-
84883284152
-
SIMPLE-fying middlebox policy enforcement using SDN
-
Z. Qazi, C. Tu, L. Chiang, R. Miao, and M. Yu. SIMPLE-fying Middlebox Policy Enforcement Using SDN. In Proc. SIGCOMM, 2013.
-
(2013)
Proc. SIGCOMM
-
-
Qazi, Z.1
Tu, C.2
Chiang, L.3
Miao, R.4
Yu, M.5
-
18
-
-
84893766472
-
Network-wide deployment of intrusion detection and prevention systems
-
V. Sekar et al. Network-wide deployment of intrusion detection and prevention systems. In Proc. CoNext, 2010.
-
(2010)
Proc. CoNext
-
-
Sekar, V.1
-
19
-
-
84883723982
-
Design and implementation of a consolidated middlebox architecture
-
V. Sekar et al. Design and implementation of a consolidated middlebox architecture. In Proc. NSDI, 2012.
-
(2012)
Proc. NSDI
-
-
Sekar, V.1
-
20
-
-
84866513406
-
Making middleboxes someone else's problem: Network processing as a cloud service
-
J. Sherry et al. Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service. In Proc. SIGCOMM, 2012.
-
(2012)
Proc. SIGCOMM
-
-
Sherry, J.1
|