-
1
-
-
84893626159
-
Sdn security: A survey
-
S. Scott-Hayward, G. O'Callaghan, and S. Sezer, "SDN Security: A Survey, " in IEEE SDN for Future Networks and Services (SDN4FNS), 2013, pp. 1-7
-
(2013)
IEEE SDN for Future Networks and Services (SDN4FNS
, pp. 1-7
-
-
Scott-Hayward, S.1
O'Callaghan, G.2
Sezer, S.3
-
2
-
-
84872169858
-
-
online]. Available
-
Open Networking Foundation." [Online]. Available: https://www.opennetworking.org/
-
Open Networking Foundation
-
-
-
3
-
-
84883671159
-
Towards secure and dependable software-defined networks
-
ACM
-
D. Kreutz, F. Ramos, and P. Verissimo, "Towards secure and dependable software-defined networks, " in Proceedings of the 2nd ACM SIGCOMM workshop on Hot topics in SDN. ACM, 2013, pp. 55-60
-
(2013)
Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in SDN
, pp. 55-60
-
-
Kreutz, D.1
Ramos, F.2
Verissimo, P.3
-
4
-
-
85013634872
-
A nice way to test openflow applications
-
M. Canini, D. Venzano, P. Peresini, D. Kostic, and J. Rexford, "A NICE way to test OpenFlow applications, " in Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, 2012
-
(2012)
Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation
-
-
Canini, M.1
Venzano, D.2
Peresini, P.3
Kostic, D.4
Rexford, J.5
-
6
-
-
84893622503
-
-
online]. Available
-
S. Son, S. Shin, V. Yegneswaran, P. Porras, and G. Gu, "Model Checking Invariant Security Properties in OpenFlow." [Online]. Available: http://faculty.cse.tamu.edu/guofei/paper/Flover-ICC13.pdf
-
Model Checking Invariant Security Properties in OpenFlow
-
-
Son, S.1
Shin, S.2
Yegneswaran, V.3
Porras, P.4
Gu, G.5
-
7
-
-
84893267876
-
Veriflow: Verifying network-wide invariants in real time
-
A. Khurshid, W. Zhou, M. Caesar, and P. Godfrey, "VeriFlow: Verifying network-wide invariants in real time, " ACM SIGCOMM Computer Communication Review, vol. 42, no. 4, pp. 467-472, 2012
-
(2012)
ACM SIGCOMM Computer Communication Review
, vol.42
, Issue.4
, pp. 467-472
-
-
Khurshid, A.1
Zhou, W.2
Caesar, M.3
Godfrey, P.4
-
8
-
-
77954330731
-
-
University of Chicago Tech.Rep
-
T. Hinrichs, N. Gude, M. Casado, J. Mitchell, and S. Shenker, "Expressing and enforcing flow-based network security policies, " University of Chicago, Tech.Rep, 2008
-
(2008)
Expressing and Enforcing Flow-based Network Security Policies
-
-
Hinrichs, T.1
Gude, N.2
Casado, M.3
Mitchell, J.4
Shenker, S.5
-
9
-
-
84893603300
-
Splendid isolation: Language-based security for software-defined networks
-
ACM
-
C. Schlesinger, A. Story, S. Gutz, N. Foster, and D. Walker, "Splendid Isolation: Language-Based Security for Software-Defined Networks, " in Proceedings of the 1st workshop on Hot topics in SDN. ACM, 2012, pp. 79-84
-
(2012)
Proceedings of the 1st Workshop on Hot Topics in SDN
, pp. 79-84
-
-
Schlesinger, C.1
Story, A.2
Gutz, S.3
Foster, N.4
Walker, D.5
-
10
-
-
80053341773
-
Frenetic: A network programming language
-
N. Foster, R. Harrison, M. J. Freedman, C. Monsanto, J. Rexford, A. Story, and D. Walker, "Frenetic: A network programming language, " ACM SIGPLAN Notices, vol. 46, no. 9, pp. 279-291, 2011
-
(2011)
ACM SIGPLAN Notices
, vol.46
, Issue.9
, pp. 279-291
-
-
Foster, N.1
Harrison, R.2
Freedman, M.J.3
Monsanto, C.4
Rexford, J.5
Story, A.6
Walker, D.7
-
11
-
-
84866518191
-
A security enforcement kernel for openflow networks
-
ACM
-
P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, "A security enforcement kernel for OpenFlow networks, " in Proceedings of the 1st workshop on Hot topics in SDN. ACM, 2012, pp. 121-126
-
(2012)
Proceedings of the 1st Workshop on Hot Topics in SDN
, pp. 121-126
-
-
Porras, P.1
Shin, S.2
Yegneswaran, V.3
Fong, M.4
Tyson, M.5
Gu, G.6
-
12
-
-
84883723129
-
Towards a secure controller platform for openflow applications
-
ACM
-
X. Wen, Y. Chen, C. Hu, C. Shi, and Y. Wang, "Towards a secure controller platform for openflow applications, " in Proceedings of the second ACM SIGCOMM workshop on Hot topics in SDN. ACM, 2013, pp. 171-172
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in SDN
, pp. 171-172
-
-
Wen, X.1
Chen, Y.2
Hu, C.3
Shi, C.4
Wang, Y.5
-
13
-
-
84920002765
-
-
online]. Available 1drv.ms/1k2WDTC
-
Security-Enhanced Floodlight." [Online]. Available: 1drv.ms/1k2WDTC
-
Security-Enhanced Floodlight
-
-
-
14
-
-
84920002764
-
-
For Developers, Architecture." online]. Available: bit.ly/1jLHoxe
-
Floodlight Controller, Floodlight Documentation, For Developers, Architecture." [Online]. Available: bit.ly/1jLHoxe
-
Floodlight Controller, Floodlight Documentation
-
-
|