-
2
-
-
84919935425
-
Software defined networking: A comprehensive survey
-
D. Kreutz et al., "Software Defined Networking: A Comprehensive Survey", Proc. of the IEEE, vol. 103, no. 1, pp. 14-76, 2015.
-
(2015)
Proc. of the IEEE
, vol.103
, Issue.1
, pp. 14-76
-
-
Kreutz, D.1
-
3
-
-
84883687346
-
Attacking software-defined networks: A first feasibility study"
-
Hong Kong, China
-
S. Shin and G. Gu, "Attacking software-defined networks: A first feasibility study", in Proc. 2nd ACM SIGCOMM Worksh. Hot Topics in Softw. Def. Netw. HotSDN'13, Hong Kong, China, 2013, pp. 165-166.
-
(2013)
Proc. 2nd ACM SIGCOMM Worksh. Hot Topics in Softw. Def. Netw. HotSDN'13
, pp. 165-166
-
-
Shin, S.1
Gu, G.2
-
4
-
-
84883671159
-
Towards secure and dependable software-defined networks"
-
D. Kreutz, F. M. V. Ramos, and P. Verissimo, "Towards secure and dependable software-defined networks", in Proc. 2nd ACM SIG-COMM Worksh. Hot Topics in Softw. Def. Netw. HotSDN'13, Hong Kong, China, 2013, pp. 55-60.
-
(2013)
Proc. 2nd ACM SIG-COMM Worksh. Hot Topics in Softw. Def. Netw. HotSDN'13, Hong Kong, China
, pp. 55-60
-
-
Kreutz, D.1
Ramos, F.M.V.2
Verissimo, P.3
-
5
-
-
84952915933
-
A survey on vulnerabilities of openflow network and its impact on SDN/Openflow controller
-
V. Tiwari, R. Parekh, and V. Patel, "A survey on vulnerabilities of openflow network and its impact on SDN/Openflow controller", World Academic J. Eng. Sci., vol. 1, no. 01:1005, 2014.
-
(2014)
World Academic J. Eng. Sci.
, vol.1
, Issue.1
, pp. 1005
-
-
Tiwari, V.1
Parekh, R.2
Patel, V.3
-
6
-
-
84857255431
-
Revisiting traffic anomaly detection using software defined networking
-
R. Sommer, D. Balzarotti, and G. Maier, Eds. LNCS Berlin Heidelberg: Springer
-
S. Akbar Mehdi, J. Khalid, S. A. Khayam, "Revisiting traffic anomaly detection using software defined networking", in Recent Advances in Intrusion Detection, R. Sommer, D. Balzarotti, and G. Maier, Eds. LNCS, vol. 6961, pp. 161-180. Berlin Heidelberg: Springer, 2011.
-
(2011)
Recent Advances in Intrusion Detection
, vol.6961
, pp. 161-180
-
-
Akbar Mehdi, S.1
Khalid, J.2
Khayam, S.A.3
-
7
-
-
84898984732
-
A fuzzy logic-based information security management for software-defined networks
-
Pyeongchang, South Korea
-
S. Dotcenko, A. Vladyko, and I. Letenko, "A fuzzy logic-based information security management for software-defined networks", in Proc. 16th Int. Cof. Adv. Commun. Technol. ICACT 2014, Pyeongchang, South Korea, 2014, pp. 167-171.
-
(2014)
Proc. 16th Int. Cof. Adv. Commun. Technol. ICACT 2014
, pp. 167-171
-
-
Dotcenko, S.1
Vladyko, A.2
Letenko, I.3
-
8
-
-
84897109717
-
Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
-
K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris, "Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments", J. Comp. Netw., vol. 62, pp. 122-136, 2014.
-
(2014)
J. Comp. Netw.
, vol.62
, pp. 122-136
-
-
Giotis, K.1
Argyropoulos, C.2
Androulidakis, G.3
Kalogeras, D.4
Maglaris, V.5
-
9
-
-
79955041204
-
Lightweight DDoS flooding attack detection using NOX/OpenFlow
-
Denver, Colorado, USA
-
R. Braga, E. Mota, and A. Passito, "Lightweight DDoS flooding attack detection using NOX/OpenFlow", in Proc. 35th Ann. IEEE Conf. Local Comp. Netw. LCN 2010, Denver, Colorado, USA, 2010, pp. 408-415.
-
(2010)
Proc. 35th Ann. IEEE Conf. Local Comp. Netw. LCN 2010
, pp. 408-415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
-
10
-
-
84952943708
-
-
OpenDaylight Platform [Online]
-
OpenDaylight Platform [Online]. Available: https://www.opendaylight.org/
-
-
-
-
11
-
-
84952886310
-
-
Mininet-An Instant Virtual Network on your Laptop (or other PC) [Online]
-
Mininet-An Instant Virtual Network on your Laptop (or other PC) [Online]. Available: http://minimet.org
-
-
-
-
12
-
-
84949928804
-
Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey
-
Coimbatore, India
-
A. S. Subaira and P. Anitha, "Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey", in 8th IEEE Int. Conf. Intell. Syhst. & Control ISCO 2014, Coimbatore, India, 2014, pp. 274-280.
-
(2014)
8th IEEE Int. Conf. Intell. Syhst. & Control ISCO 2014
, pp. 274-280
-
-
Subaira, A.S.1
Anitha, P.2
-
13
-
-
84952930874
-
Intrusion detection system using self organizing map: A surevey
-
K. Choksi, B. Shah, and O. Kale, "Intrusion detection system using self organizing map: a surevey", Int. J. Engin. Res. Appl., vol. 4, no. 12, pp. 11-16, 2014.
-
(2014)
Int. J. Engin. Res. Appl.
, vol.4
, Issue.12
, pp. 11-16
-
-
Choksi, K.1
Shah, B.2
Kale, O.3
-
15
-
-
84952888493
-
-
SOMz: Self Organizing Maps and random atlas" [Online]
-
"SOMz: Self Organizing Maps and random atlas" [Online]. Available: http://lcdm.astro.illinois.edu/static/code/mlz/MLZ-1.2/doc/html/somz.html
-
-
-
|