-
3
-
-
84873897891
-
Improving network management with software defined networking
-
IEEE
-
H. Kim and N. Feamster, "Improving network management with software defined networking," Communications Magazine, IEEE, vol. 51, no. 2, pp. 114-119, 2013.
-
(2013)
Communications Magazine
, vol.51
, Issue.2
, pp. 114-119
-
-
Kim, H.1
Feamster, N.2
-
4
-
-
84866518191
-
A security enforcement kernel for OpenFlow networks
-
ser. HotSDN '12. New York, NY, USA: ACM, [Online]
-
P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, "A security enforcement kernel for OpenFlow networks," in Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ser. HotSDN '12. New York, NY, USA: ACM, 2012, pp. 121-126. [Online]. http://doi.acm.orgl10.1145/2342441.2342466
-
(2012)
Proceedings of the First Workshop on Hot Topics in Software Defined Networks
, pp. 121-126
-
-
Porras, P.1
Shin, S.2
Yegneswaran, V.3
Fong, M.4
Tyson, M.5
Gu, G.6
-
5
-
-
84883724952
-
FRESCO: Modular composable security services for software-defined networks
-
Feb.
-
S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, and M. Tyson, "FRESCO: Modular composable security services for software-defined networks," in Internet Society NDSS., Feb. 2013.
-
(2013)
Internet Society NDSS
-
-
Shin, S.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Gu, G.5
Tyson, M.6
-
6
-
-
84883671159
-
Towards secure and dependable software-defined networks
-
ser. HotSDN'13. New York, NY, USA: ACM
-
D. Kreutz, F. M. Ramos, and P. Verissimo, 'Towards secure and dependable software-defined networks," in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, ser. HotSDN'13. New York, NY, USA: ACM, 2013, pp. 55-60.
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
, pp. 55-60
-
-
Kreutz, D.1
Ramos, F.M.2
Verissimo, P.3
-
7
-
-
84919482599
-
-
[Online]
-
Diego Kreutz, Member, Fernando M. V. Ramos, Paulo Verissimo, Fellow, Christian Esteve Rothenberg, Siamak Azodolmolky, and Steve Uhlig, "Software-Defined Networking: A Comprehensive Survey". [Online]: http://arxiv.orglabsl1406.0440
-
Software-Defined Networking: A Comprehensive Survey
-
-
Kreutz, D.1
Ramos, F.M.V.2
Verissimo, P.3
Rothenberg, C.E.4
Azodolmolky, S.5
Uhlig, S.6
-
9
-
-
84883731668
-
-
Mar. [Online]
-
S. M. Kerner, "Is SDN Secure?" Mar 2013. [Online]. Available: http://www.enterprisenetworkingplanet.com/netsecur/is-sdn-ecure.html
-
(2013)
Is SDN Secure?
-
-
Kerner, S.M.1
-
10
-
-
84896800526
-
-
Master's thesis, Swiss Federal Institute of Technology Zurich (ETH), Zurich, Swiss
-
R. Kloti, "Openflow: A security analysis," Master's thesis, Swiss Federal Institute of Technology Zurich (ETH), Zurich, Swiss, 2013.
-
(2013)
Openflow: A Security Analysis
-
-
Kloti, R.1
-
12
-
-
84919912654
-
Attacking software-defined networks: A first feasibility study
-
ser. HotSDN'13. New York, NY, USA: ACM
-
S. Shin and G. Gu, "Attacking software-defined networks: A first feasibility study," in Proceedings of the second workshop on Hot topics in software defined networks, ser. HotSDN'13. New York, NY, USA: ACM, 2013, pp. 1-2.
-
(2013)
Proceedings of the Second Workshop on Hot Topics in Software Defined Networks
, pp. 1-2
-
-
Shin, S.1
Gu, G.2
-
13
-
-
84883734157
-
OpenFlow vulnerability assessment
-
ser. HotSDN '13. New York, NY, USA: ACM
-
K. Benton, L. J. Camp, and C. Small, "OpenFlow vulnerability assessment," in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, ser. HotSDN '13. New York, NY, USA: ACM, 2013, pp. 151-152.
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
, pp. 151-152
-
-
Benton, K.1
Camp, L.J.2
Small, C.3
-
14
-
-
84921643056
-
-
(December) [Online]
-
M. Masikos, O. Zouraraki C. Patrikakis. (2004, December) CISCO. [Online]. http://www.cisco.comlweb/aboutlac123/ac147/archived-issues/ipj-7-4/dos-attacks.html
-
(2004)
CISCO
-
-
Masikos, M.1
Zouraraki, O.2
Patrikakis, C.3
-
16
-
-
84921660905
-
-
(December) [Online]
-
Prolexic. (2013, December) DoS and DDoS attack reports, trends and statistics. [Online]. http://www.prolexic.com/knowledge-center-dos-andddos-attackreports.html
-
(2013)
DoS and DDoS Attack Reports, Trends and Statistics
-
-
-
17
-
-
84921690614
-
-
(Oct) [Online]
-
Google, Arbor. (2013, Oct) Digital Attack Map. [Online]. http://www.digitalattackmap.coml#anim=I&color=O&country=ALL&time16003&view=map
-
(2013)
Digital Attack Map
-
-
-
19
-
-
84921643054
-
Article: Survey on intrusion detection system using machine learning techniques
-
September. Published by Foundation of Computer Science, New York, USA
-
Sharmila Kishor Wagh, Vinod K Pachghare and Satish R Kolhe. Article: Survey on Intrusion Detection System using Machine Learning Techniques. International Journal of Computer Applications 78(16):30-37, September 2013. Published by Foundation of Computer Science, New York, USA
-
(2013)
International Journal of Computer Applications
, vol.78
, Issue.16
, pp. 30-37
-
-
Wagh, S.K.1
Pachghare, V.K.2
Kolhe, S.R.3
-
22
-
-
0000646059
-
Learning internal representations by back-propagating errors
-
D. Rumelhart and I. McClelland editors, MIT Press
-
D. Rumelhart, G. Hinton and R Williams, "Learning internal representations by back-propagating errors," Parallel Distributed Processing: Explorations in the Microstructure of Cognition, D. Rumelhart and I. McClelland editors, vol. 1, pp. 3 18-362, MIT Press, 1986.
-
(1986)
Parallel Distributed Processing: Explorations in the Microstructure of Cognition
, vol.1
, pp. 318-362
-
-
Rumelhart, D.1
Hinton, G.2
Williams, R.3
-
24
-
-
0038458145
-
Evolving Fuzzy classifiers for intrusion detection
-
United States Military Academy, West Point, NY June
-
Jonatan Gomez and Dipankar Dasgupta "Evolving Fuzzy Classifiers for Intrusion Detection" Workshop on Information Assurance United States Military Academy, West Point, NY June 2001
-
(2001)
Workshop on Information Assurance
-
-
Gomez, J.1
Dasgupta, D.2
-
25
-
-
84921643053
-
-
(GAIDS) Aug.
-
AA Ojugo, AO. Eboka, O.E. Okonta, R.E Yoro, F.O. Aghware "Genetic Algorithm Rule-Based Intrusion Detection System" (GAIDS), ISSN 2079-8407 VOL. 3, NO. 8 Aug, 2012
-
(2012)
Genetic Algorithm Rule-Based Intrusion Detection System
, vol.3
, Issue.8
-
-
Ojugo, A.A.1
Eboka, A.O.2
Okonta, O.E.3
Yoro, R.E.4
Aghware, F.O.5
-
26
-
-
28444477388
-
Intrusion detection based on clustering genetic algorithml
-
Guangzhou
-
J. L. Zhao, J. F. Zhao, and J. J. Li, - Intrusion Detection Based on Clustering Genetic Algorithml, International Conference on Machine Learning and Cybernetics IEEE, Guangzhou, 2005, pp. 3911-3914.
-
(2005)
International Conference on Machine Learning and Cybernetics IEEE
, pp. 3911-3914
-
-
Zhao, J.L.1
Zhao, J.F.2
Li, J.J.3
-
27
-
-
85037149423
-
A study of crossover operators in genetic programming
-
Charlotte, NC
-
W. Spears, and V. Anand, -A Study of Crossover Operators in Genetic Programming", In Proceedings of the Sixth International Symposium on Methodologies for Intelligent Systems, Charlotte, NC. 1991, pp. 409-418.
-
(1991)
Proceedings of the Sixth International Symposium on Methodologies for Intelligent Systems
, pp. 409-418
-
-
Spears, W.1
Anand, V.2
-
28
-
-
84871879955
-
Rule based network intrusion detection using genetic algorithm
-
March
-
M. S. A Khan, "Rule based Network Intrusion Detection using Genetic Algorithm," International J. Computer Applications, vol. 18, no. 8, pp. 26-29, March 2011.
-
(2011)
International J. Computer Applications
, vol.18
, Issue.8
, pp. 26-29
-
-
Khan, M.S.A.1
-
29
-
-
84921662399
-
FuGelDS : Fuzzy genetic paradigms in intrusion detection systems
-
Rajdeep Borgohain, " FuGelDS : Fuzzy Genetic paradigms in Intrusion Detection Systems," International Journal of Advanced Networking and Applications, vol. 3, no. 6, pp. 1409-1415, 2012
-
(2012)
International Journal of Advanced Networking and Applications
, vol.3
, Issue.6
, pp. 1409-1415
-
-
Borgohain, R.1
-
30
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
February
-
P Garcia Teodora, J Diaz Verdejo, G Macia Farnandez, and E Vazquez, "Anomaly-based network intrusion detection: Techniques, Systems and Challenges," Journal of Computers & Security, vol. 28, no. 1, pp. 18-28, February 2009.
-
(2009)
Journal of Computers & Security
, vol.28
, Issue.1
, pp. 18-28
-
-
Garcia Teodora, P.1
Diaz Verdejo, J.2
MacIa Farnandez, G.3
Vazquez, E.4
-
31
-
-
77954276704
-
Machine learning-based intrusion detection algorithms
-
Hua TANG†", Zhuolin CAO "Machine Learning-based Intrusion Detection Algorithms "Journal of Computational Information Systems5:6(2009) 1825-1831.
-
(2009)
Journal of Computational Information Systems
, vol.5
, Issue.6
, pp. 1825-1831
-
-
Tang, H.1
Cao, Z.2
-
32
-
-
68649129121
-
Openjlow: Enabling innovation in campus networks
-
Mar.
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "Openjlow: enabling innovation in Campus networks, " SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp. 69-74, Mar. 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
33
-
-
84908215297
-
-
[Online]
-
ONF, "Open networking foundation" 2014. [Online]. Available: https://www.opennetworking.orgi
-
(2014)
Open Networking Foundation
-
-
ONF1
-
34
-
-
0037788906
-
Decision tree learning
-
T. Mitchell, The McGraw-Hili Companies, Inc.
-
T. Mitchell, "Decision Tree Learning", in T. Mitchell, Machine Learning, The McGraw-Hili Companies, Inc., 1997, pp. 52-78.
-
(1997)
Machine Learning
, pp. 52-78
-
-
Mitchell, T.1
|