-
1
-
-
84923918250
-
Software-defined control of the virtualized mobile packet core
-
Sama MR, Contreras LM, Kaippallimalil J, Akiyoshi I, Qian H, Ni H (2015) Software-defined control of the virtualized mobile packet core. IEEE Commun Mag 53(2):107–115
-
(2015)
IEEE Commun Mag
, vol.53
, Issue.2
, pp. 107-115
-
-
Sama, M.R.1
Contreras, L.M.2
Kaippallimalil, J.3
Akiyoshi, I.4
Qian, H.5
Ni, H.6
-
2
-
-
84925076185
-
Spatial Spectrum and Energy Efficiency of Random Cellular Networks
-
Ge X, Yang B, Ye J, Mao G, Wang C-X, Han T (2015) Spatial Spectrum and Energy Efficiency of Random Cellular Networks. IEEE Trans Commun 63(3):1019–1030
-
(2015)
IEEE Trans Commun
, vol.63
, Issue.3
, pp. 1019-1030
-
-
Ge, X.1
Yang, B.2
Ye, J.3
Mao, G.4
Wang, C.-X.5
Han, T.6
-
3
-
-
84903795720
-
An architecture for software defined wireless networking
-
Bernardos C, La Oliva A, Serrano P, Banchs A, Contreras LM, Jin H, Zúñiga JC (2014) An architecture for software defined wireless networking. IEEE Wirel Commun 21(3):52–61
-
(2014)
IEEE Wirel Commun
, vol.21
, Issue.3
, pp. 52-61
-
-
Bernardos, C.1
La Oliva, A.2
Serrano, P.3
Banchs, A.4
Contreras, L.M.5
Jin, H.6
Zúñiga, J.C.7
-
4
-
-
80855138617
-
Capacity Analysis of a Multi-Cell Multi-Antenna Cooperative Cellular Network with Co-Channel Interference
-
Ge X, Huang K, Wang C-X, Hong X, Yang X (2011) Capacity Analysis of a Multi-Cell Multi-Antenna Cooperative Cellular Network with Co-Channel Interference. IEEE Trans Wirel Commun 10(10):3298–3309
-
(2011)
IEEE Trans Wirel Commun
, vol.10
, Issue.10
, pp. 3298-3309
-
-
Ge, X.1
Huang, K.2
Wang, C.-X.3
Hong, X.4
Yang, X.5
-
5
-
-
84897994543
-
On the Cost–QoE Tradeoff for Cloud-Based Video Streaming Under Amazon EC2’s Pricing Models
-
He J, Wen Y, Huang J, Wu D (2014) On the Cost–QoE Tradeoff for Cloud-Based Video Streaming Under Amazon EC2’s Pricing Models. IEEE Transactions on Circuits and Systems for Video Technology 24(4):669–680
-
(2014)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.24
, Issue.4
, pp. 669-680
-
-
He, J.1
Wen, Y.2
Huang, J.3
Wu, D.4
-
6
-
-
84938292036
-
-
Chávez-Santiago R, Szydełko M, Kliks A, Foukalas F, Haddad Y, Nolan KE, Kelly MY, Masonta MT, Balasingham I (2015) 5G: The convergence of wireless communications. Wirel Pers Commun:1–26
-
Chávez-Santiago R, Szydełko M, Kliks A, Foukalas F, Haddad Y, Nolan KE, Kelly MY, Masonta MT, Balasingham I (2015) 5G: The convergence of wireless communications. Wirel Pers Commun:1–26
-
-
-
-
7
-
-
84872222730
-
Techno-economic analysis of software defined networking as architecture for the virtualization of a mobile network
-
European Workshop on Software Defined Networking (EWSDN), IEEE
-
Naudts B, Kind M, Westphal F-J, Verbrugge S, Colle D, Pickavet M (2012) Techno-economic analysis of software defined networking as architecture for the virtualization of a mobile network. In: 2012 European Workshop on Software Defined Networking (EWSDN). IEEE, pp 67–72
-
(2012)
In
, vol.2012
, pp. 67-72
-
-
Naudts, B.1
Kind, M.2
Westphal, F.-J.3
Verbrugge, S.4
Colle, D.5
Pickavet, M.6
-
8
-
-
84906785658
-
A survey of software-defined networking: past, present, and future of programmable networks
-
Nunes B, Mendonca M, Nguyen X-N, Obraczka K, Turletti T, et al. (2014) A survey of software-defined networking: past, present, and future of programmable networks. IEEE Communications Surveys & Tutorials 16(3):1617–1634
-
(2014)
IEEE Communications Surveys & Tutorials
, vol.16
, Issue.3
, pp. 1617-1634
-
-
Nunes, B.1
Mendonca, M.2
Nguyen, X.-N.3
Obraczka, K.4
Turletti, T.5
-
9
-
-
84925867806
-
Cloud RAN for mobile networks – a technology overview
-
Checko A, Christiansen HL, Yan Y, Scolari L, Kardaras G, Berger MS, Dittmann L (2014) Cloud RAN for mobile networks – a technology overview. IEEE Communications Surveys & Tutorials 17(1):405–426
-
(2014)
IEEE Communications Surveys & Tutorials
, vol.17
, Issue.1
, pp. 405-426
-
-
Checko, A.1
Christiansen, H.L.2
Yan, Y.3
Scolari, L.4
Kardaras, G.5
Berger, M.S.6
Dittmann, L.7
-
10
-
-
84877782894
-
Expanding lte network spectrum with cognitive radios: From concept to implementation
-
Xiao J, Hu R, Qian Y, Gong L, Wang B (2013) Expanding lte network spectrum with cognitive radios: From concept to implementation. IEEE Wirel Commun 20(2):12–19
-
(2013)
IEEE Wirel Commun
, vol.20
, Issue.2
, pp. 12-19
-
-
Xiao, J.1
Hu, R.2
Qian, Y.3
Gong, L.4
Wang, B.5
-
11
-
-
84990949087
-
Software-defined networks for future networks and services: main technical challenges and business implications, SDN4FNS
-
Manzalini A, Saracco R, Buyukkoc C, et al. (2014) Software-defined networks for future networks and services: main technical challenges and business implications, SDN4FNS. IEEE
-
(2014)
IEEE
-
-
Manzalini, A.1
Saracco, R.2
Buyukkoc, C.3
-
12
-
-
84883671159
-
Towards secure and dependable software-defined networks. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM
-
Kreutz D, Ramos F, Verissimo P (2013) Towards secure and dependable software-defined networks. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 55–60
-
(2013)
pp 55–60
-
-
Kreutz, D.1
Ramos, F.2
Verissimo, P.3
-
13
-
-
84918828099
-
Software-defined networking: Challenges and research opportunities for future internet
-
Hakiri A, Gokhale A, Berthou P, Schmidt DC, Gayraud T (2014) Software-defined networking: Challenges and research opportunities for future internet. Comput Netw 75(24):453–471
-
(2014)
Comput Netw
, vol.75
, Issue.24
, pp. 453-471
-
-
Hakiri, A.1
Gokhale, A.2
Berthou, P.3
Schmidt, D.C.4
Gayraud, T.5
-
14
-
-
84883724952
-
Fresco: Modular composable security services for software-defined networks
-
Shin S, Porras PA, Yegneswaran V, Fong MW, Gu G, Tyson M (2013) Fresco: Modular composable security services for software-defined networks. In: NDSS
-
(2013)
In: NDSS
-
-
Shin, S.1
Porras, P.A.2
Yegneswaran, V.3
Fong, M.W.4
Gu, G.5
Tyson, M.6
-
16
-
-
84990993718
-
-
Principles and practices for securing software-defined networks, 2015
-
Principles and practices for securing software-defined networks, 2015. www.opennetworking.org
-
-
-
-
17
-
-
84919935425
-
Software-defined networking: A comprehensive survey
-
Kreutz D, Ramos FM, Esteves Verissimo P, Esteve Rothenberg C, Azodolmolky S, Uhlig S (2015) Software-defined networking: A comprehensive survey. proc IEEE 103(1):14–76
-
(2015)
proc IEEE
, vol.103
, Issue.1
, pp. 14-76
-
-
Kreutz, D.1
Ramos, F.M.2
Esteves Verissimo, P.3
Esteve Rothenberg, C.4
Azodolmolky, S.5
Uhlig, S.6
-
18
-
-
78649307331
-
Blueprint for introducing innovation into wireless mobile networks. In: Proceedings of the second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures. ACM
-
Yap K-K, Sherwood R, Kobayashi M, Huang T-Y, Chan M, Handigol N, McKeown N, Parulkar G (2010) Blueprint for introducing innovation into wireless mobile networks. In: Proceedings of the second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures. ACM, pp 25–32
-
(2010)
pp 25–32
-
-
Yap, K.-K.1
Sherwood, R.2
Kobayashi, M.3
Huang, T.-Y.4
Chan, M.5
Handigol, N.6
McKeown, N.7
Parulkar, G.8
-
19
-
-
84990994204
-
Uncover security design flaws using the stride approach msdn. microsoft
-
Hernan S, Lambert S, Ostwald T, Shostack A (2006) Uncover security design flaws using the stride approach msdn. microsoft. com
-
(2006)
com
-
-
Hernan, S.1
Lambert, S.2
Ostwald, T.3
Shostack, A.4
-
20
-
-
84990993715
-
-
Wikipedia, Stride(security)–wikipedia, the free encyclopedia, 2015, [Online; accessed 20-July-2015]
-
Wikipedia, Stride(security)–wikipedia, the free encyclopedia, 2015, [Online; accessed 20-July-2015]. [Online]. Available: https://en.wikipedia.org/wiki/STRIDE_(security)
-
-
-
-
21
-
-
84924368818
-
Security in cloud computing: Opportunities and challenges
-
Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Inf Sci 305(1):357–383
-
(2015)
Inf Sci
, vol.305
, Issue.1
, pp. 357-383
-
-
Ali, M.1
Khan, S.U.2
Vasilakos, A.V.3
-
22
-
-
84915751455
-
A new control plane for 5G network architecture with a case study on unified handoff, mobility, and routing management
-
Yazıcı V, Kozat UC, Oguz Sunay M (2014) A new control plane for 5G network architecture with a case study on unified handoff, mobility, and routing management. IEEE Commun Mag 52(11):76–85
-
(2014)
IEEE Commun Mag
, vol.52
, Issue.11
, pp. 76-85
-
-
Yazıcı, V.1
Kozat, U.C.2
Oguz Sunay, M.3
-
23
-
-
84930179829
-
Cross-layer software-defined 5G network
-
Yang M, Li Y, Hu L, Li B, Jin D, Chen S, Yan Z (2014) Cross-layer software-defined 5G network. Mobile Networks and Applications 20(3):1–10
-
(2014)
Mobile Networks and Applications
, vol.20
, Issue.3
, pp. 1-10
-
-
Yang, M.1
Li, Y.2
Hu, L.3
Li, B.4
Jin, D.5
Chen, S.6
Yan, Z.7
-
24
-
-
84893371881
-
Softcell: Scalable and flexible cellular core network architecture. In: Proceedings of the ninth ACM Conference on Emerging Networking Experiments and Technologies. ACM
-
Jin X, Li LE, Vanbever L, Rexford J (2013) Softcell: Scalable and flexible cellular core network architecture. In: Proceedings of the ninth ACM Conference on Emerging Networking Experiments and Technologies. ACM, pp 163–174
-
(2013)
pp 163–174
-
-
Jin, X.1
Li, L.E.2
Vanbever, L.3
Rexford, J.4
-
25
-
-
84899935394
-
International Conference on Information Networking (ICOIN). IEEE
-
Costa-Requena J (2014) SDN integration in lte mobile backhaul networks. In: 2014 International Conference on Information Networking (ICOIN). IEEE, pp 264–269
-
(2014)
pp 264–269
-
-
-
26
-
-
84872067472
-
Nilsson T (2012) Moving the mobile evolved packet core to the cloud
-
WiMob, IEEE
-
Kempf J, Johansson B, Pettersson S, Lüning H, Nilsson T (2012) Moving the mobile evolved packet core to the cloud. In: 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp 784–791
-
2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications
, pp. 784-791
-
-
Kempf, J.1
Johansson, B.2
Pettersson, S.3
Lüning, H.4
-
27
-
-
84904988738
-
Suciu L (2014) Enabling network programmability in lte/epc architecture using OpenFlow
-
WiOpt, IEEE
-
Sama MR, Ben Hadj Said S, Guillouard K, Suciu L (2014) Enabling network programmability in lte/epc architecture using OpenFlow. In: 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt). IEEE, pp 389–396
-
2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
, pp. 389-396
-
-
Sama, M.R.1
Ben Hadj Said, S.2
Guillouard, K.3
-
28
-
-
84916243397
-
Utilizing OpenFlow, SDN and NFV in GPRS core network, in Testbeds and Research Infrastructure: Development of Networks and Communities
-
Nagy M, Kotuliak I (2014) Utilizing OpenFlow, SDN and NFV in GPRS core network, in Testbeds and Research Infrastructure: Development of Networks and Communities. Springer, pp 184–193
-
(2014)
Springer
, pp. 184-193
-
-
Nagy, M.1
Kotuliak, I.2
-
29
-
-
84913596782
-
5G Wireless Backhaul Networks: Challenges and Research Advances
-
Ge X, Cheng H, Guizani M, Han T (2014) 5G Wireless Backhaul Networks: Challenges and Research Advances. IEEE Netw 28(6):6–11
-
(2014)
IEEE Netw
, vol.28
, Issue.6
, pp. 6-11
-
-
Ge, X.1
Cheng, H.2
Guizani, M.3
Han, T.4
-
30
-
-
84890925214
-
CBM: Online Strategies on Cost-aware Buffer Management for Mobile Video Streaming
-
He J, Xue Z, Wu D, Wu DO, Wen Y (2014) CBM: Online Strategies on Cost-aware Buffer Management for Mobile Video Streaming. IEEE Transactions on Multimedia 16(1): 242–252
-
(2014)
IEEE Transactions on Multimedia
, vol.16
, Issue.1
, pp. 242-252
-
-
He, J.1
Xue, Z.2
Wu, D.3
Wu, D.O.4
Wen, Y.5
-
31
-
-
84897766928
-
Challenges on Wireless Heterogeneous Networks for Mobile Cloud Computing
-
Lei L, Zhong Z, Zheng K, Chen J, Meng H (2013) Challenges on Wireless Heterogeneous Networks for Mobile Cloud Computing. IEEE Wirel Commun 20(3):34–44
-
(2013)
IEEE Wirel Commun
, vol.20
, Issue.3
, pp. 34-44
-
-
Lei, L.1
Zhong, Z.2
Zheng, K.3
Chen, J.4
Meng, H.5
-
32
-
-
84555178451
-
Energy-efficient wireless in-home: the need for interference-controlled femtocells
-
Zheng K, Wang Y, Wang W, Dohler M, Wang J (2011) Energy-efficient wireless in-home: the need for interference-controlled femtocells. IEEE Wirel Commun 18(6):36–44
-
(2011)
IEEE Wirel Commun
, vol.18
, Issue.6
, pp. 36-44
-
-
Zheng, K.1
Wang, Y.2
Wang, W.3
Dohler, M.4
Wang, J.5
-
35
-
-
84885573091
-
Toward Optimal Deployment of Cloud-Assisted Video Distribution Services
-
He J, Wu D, Zeng Y, Hei X, Wen Y (2013) Toward Optimal Deployment of Cloud-Assisted Video Distribution Services. IEEE Transactions on Circuits and Systems for Video Technology 23(10):1717–1728
-
(2013)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.23
, Issue.10
, pp. 1717-1728
-
-
He, J.1
Wu, D.2
Zeng, Y.3
Hei, X.4
Wen, Y.5
-
36
-
-
84990949028
-
-
Network functions virtualisation (nfv), 2013
-
Network functions virtualisation (nfv), 2013. [Online]. Available: https://portal.etsi.org/nfv/nfv_white_paper2.pdf
-
-
-
-
37
-
-
84923247660
-
Virtual network security: Threats, countermeasures, and challenges
-
Bays LR, Oliveira RR, Barcellos MP, Gaspary LP, Madeira ERM (2015) Virtual network security: Threats, countermeasures, and challenges. Journal of Internet Services and Applications 6(1):1–19
-
(2015)
Journal of Internet Services and Applications
, vol.6
, Issue.1
, pp. 1-19
-
-
Bays, L.R.1
Oliveira, R.R.2
Barcellos, M.P.3
Gaspary, L.P.4
Madeira, E.R.M.5
-
38
-
-
48249150788
-
On the design of virtual machine sandboxes for distributed computing in wide-area overlays of virtual workstations
-
VTDC, IEEE
-
Wolinsky DI, Agrawal A, Boykin PO, Davis JR, Ganguly A, Paramygin V, Sheng YP, Figueiredo RJ (2006) On the design of virtual machine sandboxes for distributed computing in wide-area overlays of virtual workstations. In: 2006 First International Workshop on Virtualization Technology in Distributed Computing, 2006 VTDC. IEEE, pp 8–8
-
(2006)
2006 First International Workshop on Virtualization Technology in Distributed Computing
, vol.2006
, pp. 8
-
-
Wolinsky, D.I.1
Agrawal, A.2
Boykin, P.O.3
Davis, J.R.4
Ganguly, A.5
Paramygin, V.6
Sheng, Y.P.7
Figueiredo, R.J.8
-
40
-
-
77950857042
-
Protecting kernel code and data with a virtualization-aware collaborative operating system. In: 2009 Annual Computer Security Applications Conference, ACSAC’09. IEEE
-
de Oliveira DAS, Wu FS (2009) Protecting kernel code and data with a virtualization-aware collaborative operating system. In: 2009 Annual Computer Security Applications Conference, ACSAC’09. IEEE, pp 451–460
-
(2009)
pp 451–460
-
-
de Oliveira, D.A.S.1
Wu, F.S.2
-
41
-
-
84906494968
-
Rootkitdet: Practical end-to-end defense against kernel rootkits in a cloud environment. In: Computer Security-ESORICS 2014. Springer
-
Zhang L, Shetty S, Liu P, Jing J (2014) Rootkitdet: Practical end-to-end defense against kernel rootkits in a cloud environment. In: Computer Security-ESORICS 2014. Springer, pp 475– 493
-
(2014)
pp 475– 493
-
-
Zhang, L.1
Shetty, S.2
Liu, P.3
Jing, J.4
-
42
-
-
34548708575
-
Lurking in the shadows: Identifying systemic threats to kernel data. In: IEEE Symposium on Security and Privacy, 2007. SP’07. IEEE
-
Baliga A, Kamat P, Iftode L (2007) Lurking in the shadows: Identifying systemic threats to kernel data. In: IEEE Symposium on Security and Privacy, 2007. SP’07. IEEE, pp 246–251
-
(2007)
pp 246–251
-
-
Baliga, A.1
Kamat, P.2
Iftode, L.3
-
43
-
-
84897106892
-
Security issues in cloud environments: A survey
-
Fernandes DA, Soares LF, Gomes JV, Freire MM, Inácio PR (2014) Security issues in cloud environments: A survey. Int J Inf Secur 13(2):113–170
-
(2014)
Int J Inf Secur
, vol.13
, Issue.2
, pp. 113-170
-
-
Fernandes, D.A.1
Soares, L.F.2
Gomes, J.V.3
Freire, M.M.4
Inácio, P.R.5
-
46
-
-
79959557055
-
Addressing cloud computing security issues
-
Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Futur Gener Comput Syst 28 (3):583–592
-
(2012)
Futur Gener Comput Syst
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
47
-
-
84927760095
-
Distributed denial of service attacks in software-defined networking with cloud computing
-
Yan Q, Yu F (2015) Distributed denial of service attacks in software-defined networking with cloud computing. EEE Commun Mag 53(4):52–59
-
(2015)
EEE Commun Mag
, vol.53
, Issue.4
, pp. 52-59
-
-
Yan, Q.1
Yu, F.2
-
48
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM
-
Szefer J, Keller E, Lee RB, Rexford J (2011) Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, pp 401–412
-
(2011)
pp 401–412
-
-
Szefer, J.1
Keller, E.2
Lee, R.B.3
Rexford, J.4
-
49
-
-
84924902934
-
Wireless virtualization for next generation mobile cellular networks
-
Liang C, Yu FR (2015) Wireless virtualization for next generation mobile cellular networks. IEEE Wirel Commun 22(1):61–69
-
(2015)
IEEE Wirel Commun
, vol.22
, Issue.1
, pp. 61-69
-
-
Liang, C.1
Yu, F.R.2
-
50
-
-
84955456682
-
SDN and NFV integration in generalized mobile network architecture
-
European Conference on Networks and Communications (EuCNC), IEEE
-
Costa-Requena J, Santos JL, Guasch VF, Ahokas K, Premsankar G, Luukkainen S, Pérez OL, Itzazelaia MU, Ahmad I, Liyanage M, et al. (2015) SDN and NFV integration in generalized mobile network architecture. In: 2015 European Conference on Networks and Communications (EuCNC). IEEE, pp 154–158
-
(2015)
In
, vol.2015
, pp. 154-158
-
-
Costa-Requena, J.1
Santos, J.L.2
Guasch, V.F.3
Ahokas, K.4
Premsankar, G.5
Luukkainen, S.6
Pérez, O.L.7
Itzazelaia, M.U.8
Ahmad, I.9
Liyanage, M.10
-
51
-
-
84990948728
-
Service-oriented 5G network architecture: an end-to-end software defining approach
-
Yang M, Li Y, Li B, Jin D, Chen S (2015) Service-oriented 5G network architecture: an end-to-end software defining approach. Int J Commun Syst
-
(2015)
Int J Commun Syst
-
-
Yang, M.1
Li, Y.2
Li, B.3
Jin, D.4
Chen, S.5
-
53
-
-
84990949044
-
Poisoning network visibility in software-defined networks: New attacks and countermeasures. In: Network and Distributed System Security (NDSS) Symposium 2015. NDSS
-
Hong S, Xu L, Wang H, Gu G (2015) Poisoning network visibility in software-defined networks: New attacks and countermeasures. In: Network and Distributed System Security (NDSS) Symposium 2015. NDSS, pp 8–11
-
(2015)
pp 8–11
-
-
Hong, S.1
Xu, L.2
Wang, H.3
Gu, G.4
-
54
-
-
84883734157
-
OpenFlow vulnerability assessment. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM
-
Benton K, Camp LJ, Small C (2013) OpenFlow vulnerability assessment. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 151–152
-
(2013)
pp 151–152
-
-
Benton, K.1
Camp, L.J.2
Small, C.3
-
55
-
-
84883687346
-
Attacking software-defined networks: A first feasibility study. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM
-
Shin S, Gu G (2013) Attacking software-defined networks: A first feasibility study. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 165–166
-
(2013)
pp 165–166
-
-
Shin, S.1
Gu, G.2
-
56
-
-
84910659073
-
Rosemary: A robust, secure, and high-performance network operating system
-
Shin S, Song Y, Lee T, Lee S, Chung J, Porras P, Yegneswaran V, Noh J, Kang BB (2014) Rosemary: A robust, secure, and high-performance network operating system. ACM
-
(2014)
ACM
-
-
Shin, S.1
Song, Y.2
Lee, T.3
Lee, S.4
Chung, J.5
Porras, P.6
Yegneswaran, V.7
Noh, J.8
Kang, B.B.9
-
58
-
-
84928387229
-
A survey on security attacks and countermeasures with primary user detection in cognitive radio networks
-
Marinho J, Granjal J, Monteiro E (2015) A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP Journal on Information Security 2015(1):1–14
-
(2015)
EURASIP Journal on Information Security
, vol.2015
, Issue.1
, pp. 1-14
-
-
Marinho, J.1
Granjal, J.2
Monteiro, E.3
-
59
-
-
84990975893
-
-
Naseef M (2014) Vulnerabilities of LTE and LTE-Advanced Communication White Paper
-
Naseef M (2014) Vulnerabilities of LTE and LTE-Advanced Communication White Paper
-
-
-
-
60
-
-
84937478312
-
IEEE Global Communications Conference (GLOBECOM), vol 2014. IEEE
-
Qi F, Sun S, Rong B, Hu RQ, Qian Y Cognitive radio based adaptive SON for LTE-a heterogeneous networks. In: 2014 IEEE Global Communications Conference (GLOBECOM), vol 2014. IEEE, pp 4412–4417
-
(2014)
pp 4412–4417
-
-
Qi, F.1
Sun, S.2
Rong, B.3
Hu, R.Q.4
-
61
-
-
84896445081
-
Cognitive radio resource management for future cellular networks
-
Lien S-Y, Chen K-C, Liang Y-C, Lin Y (2014) Cognitive radio resource management for future cellular networks. IEEE Wirel Commun 21(1):70–79
-
(2014)
IEEE Wirel Commun
, vol.21
, Issue.1
, pp. 70-79
-
-
Lien, S.-Y.1
Chen, K.-C.2
Liang, Y.-C.3
Lin, Y.4
-
62
-
-
84861330060
-
Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead
-
Baldini G, Sturman T, Biswas AR, Leschhorn R, Gódor G, Street M (2012) Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Communications Surveys & Tutorials 14(2):355–379
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.14
, Issue.2
, pp. 355-379
-
-
Baldini, G.1
Sturman, T.2
Biswas, A.R.3
Leschhorn, R.4
Gódor, G.5
Street, M.6
-
63
-
-
84897653172
-
Security and enforcement in spectrum sharing
-
Park J-M, Reed JH, Beex A, Clancy TC, Kumar V, Bahrak B (2014) Security and enforcement in spectrum sharing. Proc IEEE 102(3):270–281
-
(2014)
Proc IEEE
, vol.102
, Issue.3
, pp. 270-281
-
-
Park, J.-M.1
Reed, J.H.2
Beex, A.3
Clancy, T.C.4
Kumar, V.5
Bahrak, B.6
-
64
-
-
58049113451
-
Brown TX (2008) Hammer model threat assessment of cognitive radio denial of service attacks
-
DySPAN: IEEE
-
Sethi A, Brown TX (2008) Hammer model threat assessment of cognitive radio denial of service attacks. In: 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks 2008, DySPAN 2008. IEEE, pp 1–12
-
(2008)
Networks
, vol.2008
, pp. 1-12
-
-
Sethi, A.1
-
65
-
-
84918834065
-
A layered approach to cognitive radio network security: A survey
-
Hlavacek D, Chang JM (2014) A layered approach to cognitive radio network security: A survey. Comput Netw 75(24):414– 436
-
(2014)
Comput Netw
, vol.75
, Issue.24
, pp. 414-436
-
-
Hlavacek, D.1
Chang, J.M.2
-
66
-
-
84940026342
-
Byzantine attack and defense in cognitive radio networks: A survey
-
Zhang L, Ding G, Wu Q, Zou Y, Han Z, Wang J (2015) Byzantine attack and defense in cognitive radio networks: A survey. IEEE Communication Surveys & Tutorials 17(3):1342– 1363
-
(2015)
IEEE Communication Surveys & Tutorials
, vol.17
, Issue.3
, pp. 1342-1363
-
-
Zhang, L.1
Ding, G.2
Wu, Q.3
Zou, Y.4
Han, Z.5
Wang, J.6
-
68
-
-
85020881921
-
Weaponizing femtocells: The effect of rogue devices on mobile telecommunications
-
Golde N, Redon K, Borgaonkar R (2012) Weaponizing femtocells: The effect of rogue devices on mobile telecommunications. In: NDSS
-
(2012)
In: NDSS
-
-
Golde, N.1
Redon, K.2
Borgaonkar, R.3
-
70
-
-
84964674977
-
Jimenez C (2015) Security for future software defined mobile networks
-
NGMAST, IEEE
-
Liyanage M, Ahmad I, Ylianttila M, Santos JL, Kantola R, Perez OL, Itzazelaia MU, de Oca EM, Valtierra A, Jimenez C (2015) Security for future software defined mobile networks. In: 9th International Conference on Next Generation Mobile Applications Services and Technologies (NGMAST). IEEE, pp 1–9
-
9th International Conference on Next Generation Mobile Applications Services and Technologies
, pp. 1-9
-
-
Liyanage, M.1
Ahmad, I.2
Ylianttila, M.3
Santos, J.L.4
Kantola, R.5
Perez, O.L.6
Itzazelaia, M.U.7
de Oca, E.M.8
Valtierra, A.9
-
71
-
-
84927632039
-
Evolving defense mechanism for future network security
-
Zhou H, Wu C, Jiang M, Zhou B, Gao W, Pan T, Huang M (2015) Evolving defense mechanism for future network security. IEEE Commun Mag 53(4):45–51
-
(2015)
IEEE Commun Mag
, vol.53
, Issue.4
, pp. 45-51
-
-
Zhou, H.1
Wu, C.2
Jiang, M.3
Zhou, B.4
Gao, W.5
Pan, T.6
Huang, M.7
-
72
-
-
84990994199
-
-
IaaS) clouds: IEEE Transactions on Cloud Computing
-
Gonzales D, Kaplan J, Saltzman E, Winkelman Z, Woods D (2015) Cloud-trust-a security assessment model for infrastructure as a service (IaaS) clouds, IEEE Transactions on Cloud Computing
-
(2015)
Cloud-trust-a security assessment model for infrastructure as a service
-
-
Gonzales, D.1
Kaplan, J.2
Saltzman, E.3
Winkelman, Z.4
Woods, D.5
-
73
-
-
84913593468
-
A survey on software-defined network and OpenFlow: from concept to implementation
-
Hu F, Hao Q, Bao K (2014) A survey on software-defined network and OpenFlow: from concept to implementation. IEEE Communications Surveys & Tutorials 16(4):2181–2206
-
(2014)
IEEE Communications Surveys & Tutorials
, vol.16
, Issue.4
, pp. 2181-2206
-
-
Hu, F.1
Hao, Q.2
Bao, K.3
-
74
-
-
85094658658
-
Towards a reliable SDN firewall
-
Hu H, Ahn G-J, Han W, Zhao Z (2014) Towards a reliable SDN firewall, Presented as part of the Open Networking Summit 2014 (ONS 2014)
-
(2014)
Presented as part of the Open Networking Summit
, vol.2014
, Issue.ONS 2014
-
-
Hu, H.1
Ahn, G.-J.2
Han, W.3
Zhao, Z.4
-
75
-
-
84927722083
-
Toward an SDN-enabled NFV architecture
-
Matias J, Garay J, Toledo N, Unzilla J, Jacob E (2015) Toward an SDN-enabled NFV architecture. IEEE Commun Mag 53(4):187–193
-
(2015)
IEEE Commun Mag
, vol.53
, Issue.4
, pp. 187-193
-
-
Matias, J.1
Garay, J.2
Toledo, N.3
Unzilla, J.4
Jacob, E.5
-
76
-
-
84990912903
-
A multi-agent system for smartphone intrusion detection framework. In: Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, Vol 1. Springer
-
Alzahrani AJ, Ghorbani AA (2015) A multi-agent system for smartphone intrusion detection framework. In: Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, Vol 1. Springer, pp 101–113
-
(2015)
pp 101–113
-
-
Alzahrani, A.J.1
Ghorbani, A.A.2
-
77
-
-
84990905901
-
Evaluation of intrusion prevention technique in lte based network
-
El-Gaml EF, ElAttar H, El-Badawy HM (2014) Evaluation of intrusion prevention technique in lte based network. Int J Sci Eng Res 5:1395–1400
-
(2014)
Int J Sci Eng Res
, vol.5
, pp. 1395-1400
-
-
El-Gaml, E.F.1
ElAttar, H.2
El-Badawy, H.M.3
-
78
-
-
84945978084
-
Cellpot: A concept for next generation cellular network honeypots
-
Workshop on Security Emergence Network Technology, NDSS
-
Liebergeld S, Lange M, Borgaonkar R (2014) Cellpot: A concept for next generation cellular network honeypots. In: Workshop on Security Emergence Network Technology. NDSS
-
(2014)
In
-
-
Liebergeld, S.1
Lange, M.2
Borgaonkar, R.3
-
80
-
-
85172625903
-
Festor O (2015) Anomaly traceback using software defined networking
-
PARCOMPTECH, IEEE
-
Franċois J, Festor O (2015) Anomaly traceback using software defined networking. In: 2015 National Conference on Parallel Computing Technologies (PARCOMPTECH). IEEE, pp 203–208
-
2015 National Conference on Parallel Computing Technologies
, pp. 203-208
-
-
Franċois, J.1
-
81
-
-
84927731786
-
Authentication handover and privacy protection in 5G hetnets using software-defined networking
-
Duan X, Wang X (2015) Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Commun Mag 53(4):28–35
-
(2015)
IEEE Commun Mag
, vol.53
, Issue.4
, pp. 28-35
-
-
Duan, X.1
Wang, X.2
-
82
-
-
84927712570
-
Safeguarding 5G wireless communication networks using physical layer security
-
Yang N, Wang L, Geraci G, Elkashlan M, Yuan J, Renzo MD (2015) Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun Mag 53(4):20–27
-
(2015)
IEEE Commun Mag
, vol.53
, Issue.4
, pp. 20-27
-
-
Yang, N.1
Wang, L.2
Geraci, G.3
Elkashlan, M.4
Yuan, J.5
Renzo, M.D.6
-
83
-
-
84927741456
-
Virtualized security at the network edge: A user-centric approach
-
Montero D, Yannuzzi M, Shaw A, Jacquin L, Pastor A, Serral-Gracia R, Lioy A, Risso F, Basile C, Sassu R et al (2015) Virtualized security at the network edge: A user-centric approach. IEEE Commun Mag 53(4):176–186
-
(2015)
IEEE Commun Mag
, vol.53
, Issue.4
, pp. 176-186
-
-
Montero, D.1
Yannuzzi, M.2
Shaw, A.3
Jacquin, L.4
Pastor, A.5
Serral-Gracia, R.6
Lioy, A.7
Risso, F.8
Basile, C.9
Sassu, R.10
-
84
-
-
84901399118
-
Software defined networking for security enhancement in wireless mobile networks
-
Ding AY, Crowcroft J, Tarkoma S, Flinck H (2014) Software defined networking for security enhancement in wireless mobile networks. Comput Netw 66:94–101
-
(2014)
Comput Netw
, vol.66
, pp. 94-101
-
-
Ding, A.Y.1
Crowcroft, J.2
Tarkoma, S.3
Flinck, H.4
-
86
-
-
84990993663
-
-
Leng J, Zhou Y, Zhang J, Hu C (2015) An inference attack model for flow table capacity and usage: Exploiting the vulnerability of flow table overflow in software-defined network, arXiv:1504.03095
-
(2015)
An inference attack model for flow table capacity and usage: Exploiting the vulnerability of flow table overflow in software-defined network, arXiv
, vol.1504
, pp. 03095
-
-
Leng, J.1
Zhou, Y.2
Zhang, J.3
Hu, C.4
-
87
-
-
84940542871
-
Kim K (2015) Assessing the impact of resource attack in software defined network
-
ICOIN, IEEE
-
Tri N, Hiep T, Kim K (2015) Assessing the impact of resource attack in software defined network. In: 2015 International Conference on Information Networking (ICOIN). IEEE, pp 420–425
-
2015 International Conference on Information Networking
, pp. 420-425
-
-
Tri, N.1
Hiep, T.2
-
88
-
-
84888322916
-
A survey of mobile cloud computing: architecture, applications, and approaches
-
Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13(18):1587–1611
-
(2013)
Wirel Commun Mob Comput
, vol.13
, Issue.18
, pp. 1587-1611
-
-
Dinh, H.T.1
Lee, C.2
Niyato, D.3
Wang, P.4
-
89
-
-
84990959329
-
-
Mobile device security in the workplace: 6 key risks & challenges, 2015
-
Mobile device security in the workplace: 6 key risks & challenges, 2015. [Online]. Available: http://focus.forsythe.com/articles/55/Mobile-Device-Security-in-the-Workplace-6-Key-Risks-and-Challenges
-
-
-
-
90
-
-
84888011760
-
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
-
Khan AN, Kiah MM, Madani SA, Ali M et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706
-
(2013)
J Supercomput
, vol.66
, Issue.3
, pp. 1687-1706
-
-
Khan, A.N.1
Kiah, M.M.2
Madani, S.A.3
Ali, M.4
-
91
-
-
84990975918
-
-
SDN and security, 2015.
-
SDN and security, 2015. [Online]. Available: http://onosproject.org/2015/04/03/sdn-and-security-david-jorm/
-
-
-
-
92
-
-
84883671775
-
SoftRAN: Software defined radio access network. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM
-
Gudipati A, Perry D, Li LE, Katti S (2013) SoftRAN: Software defined radio access network. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, pp 25–30
-
(2013)
pp 25–30
-
-
Gudipati, A.1
Perry, D.2
Li, L.E.3
Katti, S.4
-
93
-
-
84866518191
-
A security enforcement kernel for OpenFlow networks. In: Proceedings of the first workshop on Hot topics in software defined networks. ACM
-
Porras P, Shin S, Yegneswaran V, Fong M, Tyson M, Gu G (2012) A security enforcement kernel for OpenFlow networks. In: Proceedings of the first workshop on Hot topics in software defined networks. ACM, pp 121–126
-
(2012)
pp 121–126
-
-
Porras, P.1
Shin, S.2
Yegneswaran, V.3
Fong, M.4
Tyson, M.5
Gu, G.6
-
94
-
-
84897109717
-
Combining OpenFlow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
-
Giotis K, Argyropoulos C, Androulidakis G, Kalogeras D, Maglaris V (2014) Combining OpenFlow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput Netw 62:122–136
-
(2014)
Comput Netw
, vol.62
, pp. 122-136
-
-
Giotis, K.1
Argyropoulos, C.2
Androulidakis, G.3
Kalogeras, D.4
Maglaris, V.5
-
95
-
-
84923784594
-
Software-defined and virtualized future mobile and wireless networks: a survey
-
Yang M, Li Y, Jin D, Zeng L, Wu X, Vasilakos AV (2014) Software-defined and virtualized future mobile and wireless networks: a survey. Mobile Networks and Applications 20(1):4–18
-
(2014)
Mobile Networks and Applications
, vol.20
, Issue.1
, pp. 4-18
-
-
Yang, M.1
Li, Y.2
Jin, D.3
Zeng, L.4
Wu, X.5
Vasilakos, A.V.6
-
97
-
-
84927770130
-
Securing software defined networks: taxonomy, requirements, and open issues
-
Akhunzada A, Ahmed E, Gani A, Khan M, Imran M, Guizani S (2015) Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun Mag 53(4):36–44
-
(2015)
IEEE Commun Mag
, vol.53
, Issue.4
, pp. 36-44
-
-
Akhunzada, A.1
Ahmed, E.2
Gani, A.3
Khan, M.4
Imran, M.5
Guizani, S.6
-
98
-
-
84921494885
-
Security analysis of security applications for software defined networks. In: Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference. ACM
-
Tasch M, Khondoker R, Marx R, Bayarou K (2014) Security analysis of security applications for software defined networks. In: Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference. ACM, pp 23–30
-
(2014)
pp 23–30
-
-
Tasch, M.1
Khondoker, R.2
Marx, R.3
Bayarou, K.4
|