-
3
-
-
43249102463
-
Avoiding disruptions during maintenance operations on BGP sessions
-
P. Francois, O. Bonaventure, B. Decraene, and P.-A. Coste Avoiding disruptions during maintenance operations on BGP sessions IEEE Trans. Netw. Serv. Manage. 4 3 2007 1 11
-
(2007)
IEEE Trans. Netw. Serv. Manage.
, vol.4
, Issue.3
, pp. 1-11
-
-
Francois, P.1
Bonaventure, O.2
Decraene, B.3
Coste, P.-A.4
-
7
-
-
70350656962
-
NOX: Towards an operating system for networks
-
N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker NOX: towards an operating system for networks ACM SIGCOMM Comput. Commun. Rev. 38 3 2008 105 110
-
(2008)
ACM SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.3
, pp. 105-110
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenker, S.7
-
8
-
-
84883290864
-
B4: Experience with a globally-deployed software defined WAN
-
ACM
-
S. Jain, A. Kumar, S. Mandal, J. Ong, L. Poutievski, A. Singh, S. Venkata, J. Wanderer, J. Zhou, M. Zhu, J. Zolla, U. Holzle, S. Stuart, and A. Vahdat B4: experience with a globally-deployed software defined WAN Proceedings of SIGCOMM 2013 Conference on SIGCOMM 2013 ACM
-
(2013)
Proceedings of SIGCOMM 2013 Conference on SIGCOMM
-
-
Jain, S.1
Kumar, A.2
Mandal, S.3
Ong, J.4
Poutievski, L.5
Singh, A.6
Venkata, S.7
Wanderer, J.8
Zhou, J.9
Zhu, M.10
Zolla, J.11
Holzle, U.12
Stuart, S.13
Vahdat, A.14
-
10
-
-
0037544302
-
On the solution of reroute sequence planning problem in MPLS networks
-
B.G. Józsa, and M. Makai On the solution of reroute sequence planning problem in MPLS networks Comput. Netw. 42 2 2003 199 210
-
(2003)
Comput. Netw.
, vol.42
, Issue.2
, pp. 199-210
-
-
Józsa, B.G.1
Makai, M.2
-
11
-
-
84857207112
-
ONIX: A distributed control platform for large-scale production networks
-
T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, and S. Shenker ONIX: a distributed control platform for large-scale production networks Proceedings of the Ninth USENIX Conference on Operating Systems Design and Implementation 2010 1 6
-
(2010)
Proceedings of the Ninth USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Koponen, T.1
Casado, M.2
Gude, N.3
Stribling, J.4
Poutievski, L.5
Zhu, M.6
Ramanathan, R.7
Iwata, Y.8
Inoue, H.9
Hama, T.10
Shenker, S.11
-
14
-
-
68649129121
-
Openflow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner Openflow: enabling innovation in campus networks ACM SIGCOMM Comput. Commun. Rev. 38 2 2008 69 74
-
(2008)
ACM SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
16
-
-
84944185439
-
-
Openflow@google
-
Openflow@google. http://www.opennetsummit.org/archives/apr12/hoelzle-tue-openflow.pdf.
-
-
-
-
19
-
-
84944247692
-
Safe and correctness strategies for updating firewall policies
-
A. Kartit, A. Radi, M.E. Marraki, and B. Regragui Safe and correctness strategies for updating firewall policies Int. J. Comput. Sci. Netw. Secur. 11 3 2011 15
-
(2011)
Int. J. Comput. Sci. Netw. Secur.
, vol.11
, Issue.3
, pp. 15
-
-
Kartit, A.1
Radi, A.2
Marraki, M.E.3
Regragui, B.4
-
20
-
-
27644451689
-
Conflict classification and analysis of distributed firewall policies
-
E. Al-Shaer, H. Hamed, R. Boutaba, and M. Hasan Conflict classification and analysis of distributed firewall policies IEEE J. Selected Areas Commun. 23 10 2005 2069 2084
-
(2005)
IEEE J. Selected Areas Commun.
, vol.23
, Issue.10
, pp. 2069-2084
-
-
Al-Shaer, E.1
Hamed, H.2
Boutaba, R.3
Hasan, M.4
-
22
-
-
84937973181
-
Enabling security functions with SDN: A feasibility study
-
C. Yoon, T. Park, S. Lee, H. Kang, S. Shin, and Z. Zhang Enabling security functions with SDN: a feasibility study Comput. Netw. 85 0 2015 19 35
-
(2015)
Comput. Netw.
, vol.85
, pp. 19-35
-
-
Yoon, C.1
Park, T.2
Lee, S.3
Kang, H.4
Shin, S.5
Zhang, Z.6
-
23
-
-
84901399118
-
Software defined networking for security enhancement in wireless mobile networks
-
A. Ding, J. Crowcroft, S. Tarkoma, and H. Flinck Software defined networking for security enhancement in wireless mobile networks Comput. Netw. 66 0 2014 94 101
-
(2014)
Comput. Netw.
, vol.66
, pp. 94-101
-
-
Ding, A.1
Crowcroft, J.2
Tarkoma, S.3
Flinck, H.4
-
25
-
-
84894520570
-
Abstractions for network update
-
M. Reitblatt, N. Foster, J. Rexford, C. Schlesinger, D. Walker, Abstractions for network update, in: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 323-334.
-
Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 323-334
-
-
Reitblatt, M.1
Foster, N.2
Rexford, J.3
Schlesinger, C.4
Walker, D.5
-
27
-
-
84962579900
-
-
R. Sherwood, G. Gibb, K.-K. Yap, G. Appenzeller, M. Casado, N. McKeown, and G. Parulkar OpenFlow Switch Consortium 2009
-
(2009)
OpenFlow Switch Consortium
-
-
Sherwood, R.1
Gibb, G.2
Yap, K.-K.3
Appenzeller, G.4
Casado, M.5
McKeown, N.6
Parulkar, G.7
-
29
-
-
84871968802
-
Past: Scalable ethernet for data centers
-
ACM
-
B. Stephens, A. Cox, W. Felter, C. Dixon, and J. Carter Past: Scalable ethernet for data centers Proceedings of the Eighth International Conference on Emerging Networking Experiments and Technologies 2012 ACM 49 60
-
(2012)
Proceedings of the Eighth International Conference on Emerging Networking Experiments and Technologies
, pp. 49-60
-
-
Stephens, B.1
Cox, A.2
Felter, W.3
Dixon, C.4
Carter, J.5
-
31
-
-
80053167368
-
Seamless network-wide IGP migrations
-
L. Vanbever, S. Vissicchio, C. Pelsser, P. Francois, and O. Bonaventure Seamless network-wide IGP migrations Proceedings of the ACM SIGCOMM 2011 Conference 2011 314 325
-
(2011)
Proceedings of the ACM SIGCOMM 2011 Conference
, pp. 314-325
-
-
Vanbever, L.1
Vissicchio, S.2
Pelsser, C.3
Francois, P.4
Bonaventure, O.5
-
32
-
-
25644445935
-
Middleboxes no longer considered harmful
-
M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker Middleboxes no longer considered harmful Proceedings of the Fifth USENIX Conference on Operating Systems Design and Implementation 2004 15
-
(2004)
Proceedings of the Fifth USENIX Conference on Operating Systems Design and Implementation
, pp. 15
-
-
Walfish, M.1
Stribling, J.2
Krohn, M.3
Balakrishnan, H.4
Morris, R.5
Shenker, S.6
-
33
-
-
84866345800
-
LiveSec: Towards effective security management in large-scale production networks
-
K. Wang, Y. Qi, B. Yang, Y. Xue, and J. Li LiveSec: towards effective security management in large-scale production networks 2012 IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW) 2012 451 460
-
(2012)
2012 IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW)
, pp. 451-460
-
-
Wang, K.1
Qi, Y.2
Yang, B.3
Xue, Y.4
Li, J.5
-
34
-
-
84955445300
-
Openflow-based server load balancing gone wild
-
USENIX Association
-
R. Wang, D. Butnariu, and J. Rexford Openflow-based server load balancing gone wild Proceedings of the 11th Conference on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services 2011 USENIX Association 12
-
(2011)
Proceedings of the 11th Conference on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services
, pp. 12
-
-
Wang, R.1
Butnariu, D.2
Rexford, J.3
-
35
-
-
84924368818
-
Security in cloud computing: Opportunities and challenges
-
M. Ali, S.U. Khan, and A.V. Vasilakos Security in cloud computing: opportunities and challenges Inf. Sci. 305 2015 357 383
-
(2015)
Inf. Sci.
, vol.305
, pp. 357-383
-
-
Ali, M.1
Khan, S.U.2
Vasilakos, A.V.3
-
37
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. Vasilakos Security and privacy for storage and computation in cloud computing Inf. Sci. 258 2014 371 386
-
(2014)
Inf. Sci.
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
Vasilakos, A.7
-
38
-
-
84919935425
-
Software-defined networking: A comprehensive survey
-
D. Kreutz, F. Ramos, P.E. Verissimo, C.E. Rothenberg, S. Azodolmolky, and S. Uhlig Software-defined networking: a comprehensive survey Proc. IEEE 103 1 2015 14 76
-
(2015)
Proc. IEEE
, vol.103
, Issue.1
, pp. 14-76
-
-
Kreutz, D.1
Ramos, F.2
Verissimo, P.E.3
Rothenberg, C.E.4
Azodolmolky, S.5
Uhlig, S.6
-
41
-
-
84883284152
-
SIMPLE-fying middlebox policy enforcement using SDN
-
Z.A. Qazi, C. Tu, L. Chiang, R. Miao, V. Sekar, and M. Yu SIMPLE-fying middlebox policy enforcement using SDN Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM 2013 27 38
-
(2013)
Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM
, pp. 27-38
-
-
Qazi, Z.A.1
Tu, C.2
Chiang, L.3
Miao, R.4
Sekar, V.5
Yu, M.6
-
42
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini, and V. Kavitha A survey on security issues in service delivery models of cloud computing J. Netw. Comput. Appl. 34 2011 1 11
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
43
-
-
84866513406
-
Making middleboxes someone else's problem: Network processing as a cloud service
-
J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy, and V. Sekar Making middleboxes someone else's problem: network processing as a cloud service ACM SIGCOMM Comput. Commun. Rev. 42 4 2012 13 24
-
(2012)
ACM SIGCOMM Comput. Commun. Rev.
, vol.42
, Issue.4
, pp. 13-24
-
-
Sherry, J.1
Hasan, S.2
Scott, C.3
Krishnamurthy, A.4
Ratnasamy, S.5
Sekar, V.6
|