-
1
-
-
77649313921
-
Challenges for autonomic network management
-
Agoulmine, N., Balasubramaniam, S., Botvitch, D., Strassner, J., Lehtihet, E., Donnelly, W.: Challenges for autonomic network management. In: Proc. of 1st IEEE International Workshop on Modeling Autonomic Communications Environments, MACE 2006 (2006).
-
(2006)
Proc. of 1St IEEE International Workshop on Modeling Autonomic Communications Environments, MACE 2006
-
-
Agoulmine, N.1
Balasubramaniam, S.2
Botvitch, D.3
Strassner, J.4
Lehtihet, E.5
Donnelly, W.6
-
2
-
-
84927533119
-
From optimization to regret minimization and back again
-
In: Fox, A., Basu, S. (eds.)
-
Avramopoulos, I.C., Rexford, J., Schapire, R.E.: From optimization to regret minimization and back again. In: Fox, A., Basu, S. (eds.) SysML. USENIX Association (2008).
-
(2008)
Sysml. USENIX Association
-
-
Avramopoulos, I.C.1
Rexford, J.2
Schapire, R.E.3
-
3
-
-
79957512985
-
CONMan: A step towards network manageability
-
Ballani, H., Francis, P.: CONMan: A step towards network manageability. SIGCOMM Comput. Commun. Rev. 37(4), 205–216 (2007).
-
(2007)
SIGCOMM Comput. Commun. Rev
, vol.37
, Issue.4
, pp. 205-216
-
-
Ballani, H.1
Francis, P.2
-
4
-
-
85043718049
-
Extensible and scalable network monitoring using Open-SAFE
-
USENIX Association, Berkeley
-
Ballard, J.R., Rae, I., Akella, A.: Extensible and scalable network monitoring using Open-SAFE. In: Proc. of the 2010 Internet NetworkManagement Conf. on Research on Enterprise Networking, INM/WREN 2010, p. 8. USENIX Association, Berkeley (2010).
-
(2010)
Proc. of the 2010 Internet Networkmanagement Conf. on Research on Enterprise Networking, INM/WREN 2010
, pp. 8
-
-
Ballard, J.R.1
Rae, I.2
Akella, A.3
-
5
-
-
84883734157
-
Openflow vulnerability assessment
-
ACM, New York
-
Benton, K., Camp, L.J., Small, C.: Openflow vulnerability assessment. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN 2013, pp. 151–152. ACM, New York (2013).
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, Hotsdn 2013
, pp. 151-152
-
-
Benton, K.1
Camp, L.J.2
Small, C.3
-
6
-
-
84897696379
-
Cost-based placement of virtualized Deep Packet Inspection functions in SDN
-
Bouet, M., Leguay, J., Conan, V.: Cost-based placement of virtualized Deep Packet Inspection functions in SDN. In: Military Comm. Conf., IEEE MILCOM 2013, pp. 992–997 (November 2013).
-
(2013)
Military Comm. Conf., IEEE MILCOM 2013
, pp. 992-997
-
-
Bouet, M.1
Leguay, J.2
Conan, V.3
-
7
-
-
5444267411
-
-
Operational level of war, U.S. Army Command and General Staff College. Center for Army Tactics
-
Boyd, J.: Destruction and Creation. Operational level of war, U.S. Army Command and General Staff College. Center for Army Tactics (1987).
-
(1987)
Destruction and Creation
-
-
Boyd, J.1
-
8
-
-
79955041204
-
Lightweight DDoS flooding attack detection using NOX/OpenFlow
-
Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: 2010 IEEE 35th Conference on Local Computer Networks (LCN), pp. 408–415 (October 2010).
-
(2010)
2010 IEEE 35Th Conference on Local Computer Networks (LCN)
, pp. 408-415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
-
9
-
-
3543137178
-
Paradiseo: A framework for the reusable design of parallel and distributed metaheuristics
-
Cahon, S., Melab, N., Talbi, E.G.: Paradiseo: A framework for the reusable design of parallel and distributed metaheuristics. Journal of Heuristics 10(3), 357–380 (2004).
-
(2004)
Journal of Heuristics
, vol.10
, Issue.3
, pp. 357-380
-
-
Cahon, S.1
Melab, N.2
Talbi, E.G.3
-
10
-
-
84893382978
-
Using ant colony optimization metaheuristic and dynamic time warping for anomaly detection
-
Carvalho, L., Rodrigues, J., Barbon, S., Lemes Proenca, M.: Using ant colony optimization metaheuristic and dynamic time warping for anomaly detection. In: 2013 21st International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1–5 (September 2013).
-
(2013)
2013 21St International Conference on Software, Telecommunications and Computer Networks (Softcom)
, pp. 1-5
-
-
Carvalho, L.1
Rodrigues, J.2
Barbon, S.3
Lemes Proenca, M.4
-
11
-
-
79952821468
-
Steps towards autonomous network security: Unsupervised detection of network attacks
-
IEEE
-
Casas, P., Mazel, J., Owezarski, P.: Steps towards autonomous network security: Unsupervised detection of network attacks. In: NTMS, pp. 1–5. IEEE (2011).
-
(2011)
NTMS
, pp. 1-5
-
-
Casas, P.1
Mazel, J.2
Owezarski, P.3
-
12
-
-
84858698273
-
Unsupervised network intrusion detection systems: Detecting the unknown without knowledge
-
Casas, P., Mazel, J., Owezarski, P.: Unsupervised network intrusion detection systems: Detecting the unknown without knowledge. Comp. Comm. 35(7), 772–783 (2012).
-
(2012)
Comp. Comm
, vol.35
, Issue.7
, pp. 772-783
-
-
Casas, P.1
Mazel, J.2
Owezarski, P.3
-
13
-
-
1242265046
-
A knowledge plane for the Internet
-
In: Feldmann, A., Zitterbart, M., Crowcroft, J., Wetherall, D. (eds.), ACM
-
Clark, D.D., Partridge, C., Ramming, J.C., Wroclawski, J.: A knowledge plane for the Internet. In: Feldmann, A., Zitterbart, M., Crowcroft, J., Wetherall, D. (eds.) SIGCOMM, pp. 3–10. ACM (2003).
-
(2003)
SIGCOMM
, pp. 3-10
-
-
Clark, D.D.1
Partridge, C.2
Ramming, J.C.3
Wroclawski, J.4
-
17
-
-
84883696109
-
FlowTags: Enforcing network-wide policies in the presence of dynamic middlebox actions
-
ACM, New York
-
Fayazbakhsh, S.K., Sekar, V., Yu, M., Mogul, J.C.: FlowTags: Enforcing network-wide policies in the presence of dynamic middlebox actions. In: Proc. of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN2013, pp. 19–24. ACM, New York (2013).
-
(2013)
Proc. of the 2Nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, Hotsdn2013
, pp. 19-24
-
-
Fayazbakhsh, S.K.1
Sekar, V.2
Yu, M.3
Mogul, J.C.4
-
19
-
-
0003109864
-
On three-layer architectures
-
In: Kortenkamp, D., Bonnasso, P.R., Murphy, R. (eds.)
-
Gat, E.: On three-layer architectures. In: Kortenkamp, D., Bonnasso, P.R., Murphy, R. (eds.) Artificial Intelligence and Mobile Robots, pp. 195–210 (1998).
-
(1998)
Artificial Intelligence and Mobile Robots
, pp. 195-210
-
-
Gat, E.1
-
21
-
-
33750037341
-
A clean slate 4D approach to network control and management
-
Greenberg, A., Hjalmtysson, G., Maltz, D.A., Myers, A., Rexford, J., Xie, G., Yan, H., Zhan, J., Zhang, H.: A clean slate 4D approach to network control and management. SIGCOMM Comput. Commun. Rev. 35(5), 41–54 (2005).
-
(2005)
SIGCOMM Comput. Commun. Rev
, vol.35
, Issue.5
, pp. 41-54
-
-
Greenberg, A.1
Hjalmtysson, G.2
Maltz, D.A.3
Myers, A.4
Rexford, J.5
Xie, G.6
Yan, H.7
Zhan, J.8
Zhang, H.9
-
23
-
-
76749092270
-
The weka data mining software: An update
-
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: an update. SIGKDD Explor. Newsl. 11(1), 10–18 (2009).
-
(2009)
SIGKDD Explor. Newsl
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
24
-
-
84893266021
-
Active security
-
ACM, New York
-
Hand, R., Ton, M., Keller, E.: Active security. In: Proc. of the 12th ACM Workshop on Hot Topics in Software Defined Networking, HotNets-XII, pp. 17:1–17:7. ACM, New York (2013).
-
(2013)
Proc. of the 12Th ACM Workshop on Hot Topics in Software Defined Networking, Hotnets-Xii
, pp. 1-17
-
-
Hand, R.1
Ton, M.2
Keller, E.3
-
26
-
-
85006624458
-
-
IEEE SDN/NFV subcommittee, http://cms.comsoc.org/eprise/main/SiteGen/TC SDN NFV/Content/Home.html.
-
-
-
IEEE SDN/NFV subcommittee1
-
27
-
-
84883290864
-
B4: Experience with a globally-deployed software defined WAN
-
Jain, S., Kumar, A., Mandal, S., Ong, J., Poutievski, L., Singh, A., Venkata, S., Wanderer, J., Zhou, J., Zhu, M., Zolla, J., Hölzle, U., Stuart, S., Vahdat, A.: B4: Experience with a globally-deployed software defined WAN. SIGCOMM Comput. Commun. Rev. 43(4), 3–14 (2013).
-
(2013)
SIGCOMM Comput. Commun. Rev
, vol.43
, Issue.4
, pp. 3-14
-
-
Jain, S.1
Kumar, A.2
Mandal, S.3
Ong, J.4
Poutievski, L.5
Singh, A.6
Venkata, S.7
Wanderer, J.8
Zhou, J.9
Zhu, M.10
Zolla, J.11
Hölzle, U.12
Stuart, S.13
Vahdat, A.14
-
28
-
-
84885228199
-
Malware detection for mobile devices using software-defined networking
-
IEEE Computer Society, Washington, DC
-
Jin, R., Wang, B.:Malware detection for mobile devices using software-defined networking. In: Proc. of the 2013 2nd GENI Research and Educational Experiment Workshop, GREE 2013, pp. 81–88. IEEE Computer Society, Washington, DC (2013).
-
(2013)
Proc. of the 2013 2Nd GENI Research and Educational Experiment Workshop, GREE 2013
, pp. 81-88
-
-
Jin, R.1
Wang, B.2
-
29
-
-
79951682530
-
Anomaly detection in nuclear power plants via symbolic dynamic filtering
-
Jin, X., Guo, Y., Sarkar, S., Ray, A., Edwards, R.: Anomaly detection in nuclear power plants via symbolic dynamic filtering. IEEE Transactions on Nuclear Science 58(1), 277–288 (2011).
-
(2011)
IEEE Transactions on Nuclear Science
, vol.58
, Issue.1
, pp. 277-288
-
-
Jin, X.1
Guo, Y.2
Sarkar, S.3
Ray, A.4
Edwards, R.5
-
31
-
-
84893267876
-
VeriFlow: Verifying network-wide invariants in real time
-
Khurshid, A., Zhou, W., Caesar, M., Godfrey, P.: VeriFlow: Verifying network-wide invariants in real time. ACM SIGCOMM Comp. Commun. Rev. 42(4), 467–472 (2012).
-
(2012)
ACM SIGCOMM Comp. Commun. Rev
, vol.42
, Issue.4
, pp. 467-472
-
-
Khurshid, A.1
Zhou, W.2
Caesar, M.3
Godfrey, P.4
-
32
-
-
84887482971
-
A cognitive model-based approach for autonomic fault management in OpenFlow networks
-
Kim, S., Kang, J.M., Seo, S.S., Hong, J.W.K.: A cognitive model-based approach for autonomic fault management in OpenFlow networks. Int. Journal of Network Management 23(6), 383–401 (2013).
-
(2013)
Int. Journal of Network Management
, vol.23
, Issue.6
, pp. 383-401
-
-
Kim, S.1
Kang, J.M.2
Seo, S.S.3
Hong, J.4
-
33
-
-
84883671159
-
Towards secure and dependable software-defined networks
-
ACM, New York
-
Kreutz, D., Ramos, F.M., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proc. of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN 2013, pp. 55–60. ACM, New York (2013).
-
(2013)
Proc. of the 2Nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, Hotsdn 2013
, pp. 55-60
-
-
Kreutz, D.1
Ramos, F.M.2
Verissimo, P.3
-
34
-
-
84908657520
-
Autonomic network management for Next Generation Networks
-
Louca, A., Mauthe, A., Hutchison, D.: Autonomic network management for Next Generation Networks. In: Proc. of 11th Annual PostGraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, PGNet 2010, pp. 1–6 (2010).
-
(2010)
Proc. of 11Th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Pgnet 2010, Pp. 1–6
-
-
Louca, A.1
Mauthe, A.2
Hutchison, D.3
-
35
-
-
26844529359
-
Mason: A multiagent simulation environment
-
Luke, S., Cioffi-Revilla, C., Panait, L., Sullivan, K., Balan, G.: Mason: A multiagent simulation environment. Simulation 81(7), 517–527 (2005).
-
(2005)
Simulation
, vol.81
, Issue.7
, pp. 517-527
-
-
Luke, S.1
Cioffi-Revilla, C.2
Panait, L.3
Sullivan, K.4
Balan, G.5
-
36
-
-
78650564690
-
Bio-inspired autonomic structures: A middleware for telecommunications ecosystems
-
In: Vasilakos, A.V., Parashar, M., Karnouskos, S., Pedrycz, W. (eds.), Springer US
-
Manzalini, A., Minerva, R., Moiso, C.: Bio-inspired autonomic structures: a middleware for telecommunications ecosystems. In: Vasilakos, A.V., Parashar, M., Karnouskos, S., Pedrycz, W. (eds.) Autonomic Communication, pp. 3–30. Springer US (2009).
-
(2009)
Autonomic Communication
, pp. 3-30
-
-
Manzalini, A.1
Minerva, R.2
Moiso, C.3
-
37
-
-
84855717685
-
Sub-space clustering, inter-clustering results association & anomaly correlation for unsupervised network anomaly detection
-
IEEE
-
Mazel, J., Casas, P., Labit, Y., Owezarski, P.: Sub-space clustering, inter-clustering results association & anomaly correlation for unsupervised network anomaly detection. In: CNSM, pp. 1–8. IEEE (2011).
-
(2011)
CNSM
, pp. 1-8
-
-
Mazel, J.1
Casas, P.2
Labit, Y.3
Owezarski, P.4
-
38
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: OpenFlow: enabling innovation in campus networks. Proc. of the ACM SIGCOMM 2008 Conference. 38(2), 69–74 (2008).
-
(2008)
Proc. of the ACM SIGCOMM 2008 Conference
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Erson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
39
-
-
84883390816
-
Efficient anomaly detection in dynamic, attributed graphs: Emerging phenomena and big data
-
Miller, B., Arcolano, N., Bliss, N.: Efficient anomaly detection in dynamic, attributed graphs: Emerging phenomena and big data. In: 2013 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 179–184 (June 2013).
-
(2013)
2013 IEEE International Conference on Intelligence and Security Informatics (ISI)
, pp. 179-184
-
-
Miller, B.1
Arcolano, N.2
Bliss, N.3
-
42
-
-
77954339615
-
Resonance: Dynamic access control for enterprise networks
-
ACM, New York
-
Nayak, A.K., Reimers, A., Feamster, N., Clark, R.: Resonance: Dynamic access control for enterprise networks. In: Proc. of the 1st ACM Workshop on Research on Enterprise Networking, WREN 2009, pp. 11–18. ACM, New York (2009).
-
(2009)
Proc. of the 1St ACM Workshop on Research on Enterprise Networking, WREN 2009
, pp. 11-18
-
-
Nayak, A.K.1
Reimers, A.2
Feamster, N.3
Clark, R.4
-
46
-
-
84927533111
-
-
OpenFlow Switch Specification (version 1.1.0), February
-
OpenFlow Switch Specification (version 1.1.0), https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/openflow/openflow-spec-v1.1.0.pdf (February 2011).
-
(2011)
-
-
-
47
-
-
84927533110
-
-
OpenFlow Switch Specification (version 1.4.0), October
-
OpenFlow Switch Specification (version 1.4.0), https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/openflow/openflow-spec-v1.4.0.pdf (October 2013).
-
(2013)
-
-
-
48
-
-
84866518191
-
A security enforcement kernel for OpenFlow networks
-
ACM
-
Porras, P., Shin, S., Yegneswaran, V., Fong, M., Tyson, M., Gu, G.: A security enforcement kernel for OpenFlow networks. In: Proc. of the 1st Workshop on Hot Topics in Software Defined Networking, pp. 121–126. ACM (2012).
-
(2012)
Proc. of the 1St Workshop on Hot Topics in Software Defined Networking
, pp. 121-126
-
-
Porras, P.1
Shin, S.2
Yegneswaran, V.3
Fong, M.4
Tyson, M.5
Gu, G.6
-
49
-
-
85006598288
-
-
POX controller, http://www.noxrepo.org/pox/about-pox.
-
-
-
POX controller1
-
50
-
-
84883284152
-
SIMPLE-fying middlebox policy enforcement using SDN
-
Qazi, Z.A., Tu, C.C., Chiang, L., Miao, R., Sekar, V., Yu, M.: SIMPLE-fying middlebox policy enforcement using SDN. SIGCOMM Comput. Comm. Rev. 43(4), 27–38 (2013).
-
(2013)
SIGCOMM Comput. Comm. Rev
, vol.43
, Issue.4
, pp. 27-38
-
-
Qazi, Z.A.1
Tu, C.C.2
Chiang, L.3
Miao, R.4
Sekar, V.5
Yu, M.6
-
54
-
-
84893626159
-
SDN security: A survey
-
Scott-Hayward, S., O’Callaghan, G., Sezer, S.: SDN security: A survey. In: Proc. of IEEE SDN Conf. for Future Networks and Services (SDN4FNS), pp. 1–7 (November 2013).
-
(2013)
Proc. of IEEE SDN Conf. for Future Networks and Services (SDN4FNS)
, pp. 1-7
-
-
Scott-Hayward, S.1
O’Callaghan, G.2
Sezer, S.3
-
55
-
-
84880545424
-
Are we ready for SDN? Implementation challenges for softwaredefined networks
-
Sezer, S., Scott-Hayward, S., Chouhan, P., Fraser, B., Lake, D., Finnegan, J., Viljoen, N., Miller, M., Rao, N.: Are we ready for SDN? Implementation challenges for softwaredefined networks. IEEE Comm. Magazine 51(7), 36–43 (2013).
-
(2013)
IEEE Comm. Magazine
, vol.51
, Issue.7
, pp. 36-43
-
-
Sezer, S.1
Scott-Hayward, S.2
Chouhan, P.3
Fraser, B.4
Lake, D.5
Finnegan, J.6
Viljoen, N.7
Miller, M.8
Rao, N.9
-
56
-
-
84874562245
-
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
-
IEEE Computer Society, Washington, DC
-
Shin, S., Gu, G.: CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?). In: Proc. Of the 2012 20th IEEE Int. Conf. on Network Protocols, ICNP 2012, pp. 1–6. IEEE Computer Society, Washington, DC (2012).
-
(2012)
Proc. of the 2012 20Th IEEE Int. Conf. on Network Protocols, ICNP 2012
, pp. 1-6
-
-
Shin, S.1
Gu, G.2
-
57
-
-
84893570087
-
FRESCO: Modular composable security services for software-defined networks
-
Shin, S., Porras, P.A., Yegneswaran, V., Fong, M.W., Gu, G., Tyson, M.: FRESCO: Modular composable security services for software-defined networks. In: 20th Annual Network and Distributed System Security Symposium (NDSS 2013). The Internet Society (February 2013).
-
(2013)
20Th Annual Network and Distributed System Security Symposium (NDSS 2013). the Internet Society
-
-
Shin, S.1
Porras, P.A.2
Yegneswaran, V.3
Fong, M.W.4
Gu, G.5
Tyson, M.6
-
59
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
Staniford, S., Hoagland, J.A., McAlerney, J.M.: Practical automated detection of stealthy portscans. J. Comput. Secur. 10(1-2), 105–136 (2002).
-
(2002)
J. Comput. Secur
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
60
-
-
60549097558
-
FOCALE: A Novel Autonomic Networking Architecture
-
Strassner, J., Agoulmine, N., Lehtihet, E.: FOCALE: A Novel Autonomic Networking Architecture. Int. Trans. on Systems Science and Applications 3(1), 64–79 (2007).
-
(2007)
Int. Trans. on Systems Science and Applications
, vol.3
, Issue.1
, pp. 64-79
-
-
Strassner, J.1
Agoulmine, N.2
Lehtihet, E.3
-
61
-
-
80051992004
-
On dynamic multi-objective optimization, classification and performance measures
-
IEEE
-
Tantar, E., Tantar, A.A., Bouvry, P.: On dynamic multi-objective optimization, classification and performance measures. In: IEEE Congress on Evolutionary Computation, pp. 2759–2766. IEEE (2011).
-
(2011)
IEEE Congress on Evolutionary Computation
, pp. 2759-2766
-
-
Tantar, E.1
Tantar, A.A.2
Bouvry, P.3
-
64
-
-
84904095662
-
-
IETF Internet-Draft, draft-xie-alto-sdn-extension-use-cases-01
-
Xie, H., Tsou, T., Lopez, D.R., Yin, H.: Use Cases for ALTO with Software Defined Networks. IETF Internet-Draft, draft-xie-alto-sdn-extension-use-cases-01 (January 2013).
-
(2013)
Use Cases for ALTO with Software Defined Networks
-
-
Xie, H.1
Tsou, T.2
Lopez, D.R.3
Yin, H.4
-
65
-
-
33745809547
-
-
The Internet Engineering Task Force
-
Yang, L., Dantu, R., Anderson, T.A., Gopal, R.: Forwarding and Control Element Separation (ForCES) Framework, RFC 3746. The Internet Engineering Task Force (April 2004).
-
(2004)
Forwarding and Control Element Separation (Forces) Framework, RFC 3746
-
-
Yang, L.1
Dantu, R.2
Erson, T.A.3
Gopal, R.4
|