-
1
-
-
84926636634
-
EMC: emotion-aware mobile cloud computing in 5G
-
Chen M, Zhang Y, Li Y, Mao S, Leung V (2015) EMC: emotion-aware mobile cloud computing in 5G. IEEE Netw 29(2):32–38
-
(2015)
IEEE Netw
, vol.29
, Issue.2
, pp. 32-38
-
-
Chen, M.1
Zhang, Y.2
Li, Y.3
Mao, S.4
Leung, V.5
-
2
-
-
82755186159
-
Advances in cyber-physical systems research
-
Wan J, Yan H, Suo H, Li F (2011) Advances in cyber-physical systems research. KSII Trans Internet Inf Syst 5(11):1891–1908
-
(2011)
KSII Trans Internet Inf Syst
, vol.5
, Issue.11
, pp. 1891-1908
-
-
Wan, J.1
Yan, H.2
Suo, H.3
Li, F.4
-
3
-
-
84883726912
-
Security and privacy in mobile cloud computing
-
Cagliari, Italy
-
Suo H, Liu Z, Wan J, Zhou K (2013) Security and privacy in mobile cloud computing. In: Proceedings of the 9th IEEE International Wireless Communications and Mobile Computing Conference, Cagliari, Italy
-
(2013)
In: Proceedings of the 9th IEEE International Wireless Communications and Mobile Computing Conference
-
-
Suo, H.1
Liu, Z.2
Wan, J.3
Zhou, K.4
-
4
-
-
84990937387
-
Software-defined networking: why we like it and how we are building on it
-
Cisco Inc. (2013) Software-defined networking: why we like it and how we are building on it. White Paper
-
(2013)
White Paper
-
-
Inc, C.1
-
5
-
-
68649129121
-
OpenFlow: enabling innovation in campus networks
-
McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Turner J (2008) OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Rev 38(2):69–74
-
(2008)
ACM SIGCOMM Comput Commun Rev
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Turner, J.7
-
6
-
-
84959489074
-
Software-defined internet of things for smart urban sensing
-
Liu J, Li Y, Chen M, Dong W, Jin D (2015) Software-defined internet of things for smart urban sensing. IEEE Commun Mag 53(9):55–63
-
(2015)
IEEE Commun Mag
, vol.53
, Issue.9
, pp. 55-63
-
-
Liu, J.1
Li, Y.2
Chen, M.3
Dong, W.4
Jin, D.5
-
7
-
-
84883279958
-
Achieving high utilization with software-driven WAN
-
Hong CY, Kandula S, Mahajan R, Zhang M, Gill V, Nanduri M, Wattenhofer R (2013) Achieving high utilization with software-driven WAN. ACM SIGCOMM Comput Commun Rev 43(4):15–26
-
(2013)
ACM SIGCOMM Comput Commun Rev
, vol.43
, Issue.4
, pp. 15-26
-
-
Hong, C.Y.1
Kandula, S.2
Mahajan, R.3
Zhang, M.4
Gill, V.5
Nanduri, M.6
Wattenhofer, R.7
-
8
-
-
84990927494
-
Inter-datacenter WAN with centralized TE using SDN and OpenFlow
-
Google Inc. (2012) Inter-datacenter WAN with centralized TE using SDN and OpenFlow. Open Network Submit
-
(2012)
Open Network Submit
-
-
Inc, G.1
-
9
-
-
84883290864
-
B4: experience with a globally-deployed software defined WAN. In: Proceedings of the ACM SIGCOMM
-
Jain S, Kumar A, Mandal S, Ong J, Poutievski L, Singh A, Venkata S, Wanderer J, Zhou J, Zhou M, Zolia J, Hölzle U, Stuart S, Vahdat A (2013) B4: experience with a globally-deployed software defined WAN. In: Proceedings of the ACM SIGCOMM, pp 3–14
-
(2013)
pp 3–14
-
-
Jain, S.1
Kumar, A.2
Mandal, S.3
Ong, J.4
Poutievski, L.5
Singh, A.6
Venkata, S.7
Wanderer, J.8
Zhou, J.9
Zhou, M.10
Zolia, J.11
Hölzle, U.12
Stuart, S.13
Vahdat, A.14
-
10
-
-
84990952440
-
-
VMware NSX. [Online]
-
VMware NSX. [Online] http://www.vmware.com/products/nsx/
-
-
-
-
11
-
-
84990888397
-
-
Nuage Networks VSP. [Online]
-
Nuage Networks VSP. [Online] http://www.nuagenetworks.net/products/virtualized-services-platform/
-
-
-
-
12
-
-
84969940808
-
Security in software defined networks: a survey
-
Ahmad I, Namal S, Ylianttila M, Gurtov A (2015) Security in software defined networks: a survey. IEEE Commun Surv Tutorials 17(4):2317–2346
-
(2015)
IEEE Commun Surv Tutorials
, vol.17
, Issue.4
, pp. 2317-2346
-
-
Ahmad, I.1
Namal, S.2
Ylianttila, M.3
Gurtov, A.4
-
13
-
-
84894478621
-
A vision for cloud security
-
Zhang H (2014) A vision for cloud security. Netw Secur 2014(2):12–15
-
(2014)
Netw Secur
, vol.2014
, Issue.2
, pp. 12-15
-
-
Zhang, H.1
-
14
-
-
84883734157
-
Openflow vulnerability assessment. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking
-
Benton K, Camp L J, Small C (2013) Openflow vulnerability assessment. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pp 151–152
-
(2013)
pp 151–152
-
-
Benton, K.1
Camp, L.J.2
Small, C.3
-
15
-
-
84893626159
-
Sdn security: a survey. In: IEEE SDN Future Networks and Services (SDN4FNS)
-
Scott-Hayward S, O’Callaghan G, Sezer S (2013) Sdn security: a survey. In: IEEE SDN Future Networks and Services (SDN4FNS), pp 1–7
-
(2013)
pp 1–7
-
-
Scott-Hayward, S.1
O’Callaghan, G.2
Sezer, S.3
-
17
-
-
84990924014
-
-
Floodlight controller documentation for developers [Online]. Available:
-
Floodlight controller documentation for developers [Online]. Available: http://www.projectfloodlight.org/floodlight/
-
-
-
-
18
-
-
70350656962
-
NOX: towards an operating system for networks
-
Gude N, Koponen T, Pettit J, Pfaff B, Casado M, McKeown N, Shenker S (2008) NOX: towards an operating system for networks. ACM SIGCOMM Comput Commun Rev 38(3):105–110
-
(2008)
ACM SIGCOMM Comput Commun Rev
, vol.38
, Issue.3
, pp. 105-110
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenker, S.7
-
19
-
-
84990939964
-
-
OpenDaylight.[Online]. Available:
-
OpenDaylight.[Online]. Available: http://www.opendaylight.org
-
-
-
-
20
-
-
84919935425
-
Software-defined networking: a comprehensive survey
-
Kreutz D, Ramos FM, Esteves Verissimo P, Esteve Rothenberg C, Azodolmolky S, Uhlig S (2015) Software-defined networking: a comprehensive survey. Proc IEEE 103(1):14–76
-
(2015)
Proc IEEE
, vol.103
, Issue.1
, pp. 14-76
-
-
Kreutz, D.1
Ramos, F.M.2
Esteves Verissimo, P.3
Esteve Rothenberg, C.4
Azodolmolky, S.5
Uhlig, S.6
-
22
-
-
84990939972
-
-
Bernardo DV (2014) Software-defined networking and network function virtualization security architecture. Internet Engineering Task Force. [Online]. Available: draft-bernardo-sec-arch- sdnnvfarchitecture-00
-
Bernardo DV (2014) Software-defined networking and network function virtualization security architecture. Internet Engineering Task Force. [Online]. Available: https://tools.ietf.org/html/ draft-bernardo-sec-arch- sdnnvfarchitecture-00
-
-
-
-
23
-
-
84923784594
-
Software-defined and virtualized future mobile and wireless networks: a survey
-
Yang M, Li Y, Jin D, Zeng L, Wu X, Vasilakos A (2015) Software-defined and virtualized future mobile and wireless networks: a survey. ACM/Springer Mob Netw Appl 20(1):4–18
-
(2015)
ACM/Springer Mob Netw Appl
, vol.20
, Issue.1
, pp. 4-18
-
-
Yang, M.1
Li, Y.2
Jin, D.3
Zeng, L.4
Wu, X.5
Vasilakos, A.6
-
25
-
-
84910149653
-
Security of the internet of things: perspectives and challenges
-
Jing Q, Vasilakos A, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501
-
(2014)
Wirel Netw
, vol.20
, Issue.8
, pp. 2481-2501
-
-
Jing, Q.1
Vasilakos, A.2
Wan, J.3
Lu, J.4
Qiu, D.5
-
26
-
-
84893523854
-
SDN based inter-technology load balancing leveraged by flow admission control. In: IEEE SDN for Future Networks and Services (SDN4FNS)
-
Namal S, Ahmad I, Gurtov A, Ylianttila M (2013) SDN based inter-technology load balancing leveraged by flow admission control. In: IEEE SDN for Future Networks and Services (SDN4FNS), pp 1–5
-
(2013)
pp 1–5
-
-
Namal, S.1
Ahmad, I.2
Gurtov, A.3
Ylianttila, M.4
-
27
-
-
84990913133
-
The transport layer security (TLS) protocol version 1.2 [Online]
-
Dierks T (2008) The transport layer security (TLS) protocol version 1.2 [Online]. Available: http://tools.ietf.org/html/rfc5246
-
(2008)
Available:
-
-
Dierks, T.1
-
28
-
-
84990944387
-
-
Wasserman M, Hartman S (2013) Security analysis of the open networking foundation (ONF) OpenFlow switch specification. Internet Engineering Task Force. [Online]. Available: draft-mrw-SDNec-openflow-analysis-02
-
Wasserman M, Hartman S (2013) Security analysis of the open networking foundation (ONF) OpenFlow switch specification. Internet Engineering Task Force. [Online]. Available: https://tools.ietf.org/html/ draft-mrw-SDNec-openflow-analysis-02
-
-
-
-
29
-
-
78650109005
-
FlowChecker: configuration analysis and verification of federated OpenFlow infrastructures. In: Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration
-
Al-Shaer E, Al-Haj S (2010) FlowChecker: configuration analysis and verification of federated OpenFlow infrastructures. In: Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, pp 37–44
-
(2010)
pp 37–44
-
-
Al-Shaer, E.1
Al-Haj, S.2
-
30
-
-
84866518191
-
A security enforcement kernel for OpenFlow networks. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks
-
Porras P, Shin S, Yegneswaran V, Fong M, Tyson M, Gu G (2012) A security enforcement kernel for OpenFlow networks. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, pp 121–126
-
(2012)
pp 121–126
-
-
Porras, P.1
Shin, S.2
Yegneswaran, V.3
Fong, M.4
Tyson, M.5
Gu, G.6
-
31
-
-
84893267876
-
Veriflow: verifying network-wide invariants in real time
-
Khurshid A, Zhou W, Caesar M, Godfrey P (2012) Veriflow: verifying network-wide invariants in real time. ACM SIGCOMM Comput Commun Rev 42(4):467–472
-
(2012)
ACM SIGCOMM Comput Commun Rev
, vol.42
, Issue.4
, pp. 467-472
-
-
Khurshid, A.1
Zhou, W.2
Caesar, M.3
Godfrey, P.4
-
32
-
-
84864245314
-
A replication component for resilient OpenFlow-based networking. In: IEEE Network Operations and Management Symposium (NOMS)
-
Fonseca P, Bennesby R, Mota E, Passito A (2012) A replication component for resilient OpenFlow-based networking. In: IEEE Network Operations and Management Symposium (NOMS), pp 933–939
-
(2012)
pp 933–939
-
-
Fonseca, P.1
Bennesby, R.2
Mota, E.3
Passito, A.4
-
33
-
-
78149258537
-
Flowvisor: a network virtualization layer. OpenFlow Switch Consortium, Tech
-
Sherwood R, Gibb G, Yap K K, Appenzeller G, Casado M, McKeown N, Parulkar G (2009) Flowvisor: a network virtualization layer. OpenFlow Switch Consortium, Tech. Rep
-
(2009)
Rep
-
-
Sherwood, R.1
Gibb, G.2
Yap, K.K.3
Appenzeller, G.4
Casado, M.5
McKeown, N.6
Parulkar, G.7
-
34
-
-
84055179019
-
Source address validation solution with OpenFlow/NOX architecture. In: 19th IEEE International Conference on Network Protocols (ICNP)
-
Yao G, Bi J, Xiao P (2011) Source address validation solution with OpenFlow/NOX architecture. In: 19th IEEE International Conference on Network Protocols (ICNP), pp 7–12
-
(2011)
pp 7–12
-
-
Yao, G.1
Bi, J.2
Xiao, P.3
-
35
-
-
79955041204
-
Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: IEEE 35th Conference on Local Computer Networks (LCN)
-
Braga R, Mota E, Passito A (2010) Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: IEEE 35th Conference on Local Computer Networks (LCN), pp 408–415
-
(2010)
pp 408–415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
-
36
-
-
77954339615
-
Resonance: dynamic access control for enterprise networks. In: Proceedings of the 1st ACM Workshop on Research on Enterprise Networking
-
Nayak A K, Reimers A, Feamster N, Clark R (2009). Resonance: dynamic access control for enterprise networks. In: Proceedings of the 1st ACM Workshop on Research on Enterprise Networking, pp 11–18
-
(2009)
pp 11–18
-
-
Nayak, A.K.1
Reimers, A.2
Feamster, N.3
Clark, R.4
-
37
-
-
84889062725
-
Avant-guard: scalable and vigilant switch flow management in software-defined networks
-
ACM SIGSAC Conference on Computer &, Communications Security
-
Shin S, Yegneswaran V, Porras P, Gu G (2013) Avant-guard: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp 413–424
-
(2013)
Proceedings of the
, vol.2013
, pp. 413-424
-
-
Shin, S.1
Yegneswaran, V.2
Porras, P.3
Gu, G.4
-
38
-
-
84950135398
-
FloodGuard: a dos attack prevention extension in software-defined networks. In: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
-
Wang H, Xu L, Gu G (2015) FloodGuard: a dos attack prevention extension in software-defined networks. In: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp 239–250
-
(2015)
pp 239–250
-
-
Wang, H.1
Xu, L.2
Gu, G.3
-
39
-
-
84906715175
-
A SDN-oriented DDoS blocking scheme for botnet-based attacks. In: IEEE Sixth International Conference on Ubiquitous and Future Networks (ICUFN)
-
Lim S, Ha J I, Kim H, Kim Y, Yang S (2014) A SDN-oriented DDoS blocking scheme for botnet-based attacks. In: IEEE Sixth International Conference on Ubiquitous and Future Networks (ICUFN), pp 63–68
-
(2014)
pp 63–68
-
-
Lim, S.1
Ha, J.I.2
Kim, H.3
Kim, Y.4
Yang, S.5
-
40
-
-
84990945497
-
-
IETF Locator/ID Separation Protocol (LISP)
-
IETF Locator/ID Separation Protocol (LISP) [Online]. Available: http://datatracker.ietf.org/wg/lisp/
-
-
-
-
41
-
-
84990968306
-
-
In: Proceedings of European NetFPGA Developers Workshop
-
Suh J, Choi H G, Yoon W, You T, Kwon T, Choi Y (2010) Implementation of a Content-Oriented Networking Architecture (CONA): a focus on DDoS Countermeasure. In: Proceedings of European NetFPGA Developers Workshop
-
(2010)
Implementation of a Content-Oriented Networking Architecture (CONA): a focus on DDoS Countermeasure
-
-
Suh, J.1
Choi, H.G.2
Yoon, W.3
You, T.4
Kwon, T.5
Choi, Y.6
-
42
-
-
84990913466
-
Design and deployment of secure, robust, and resilient SDN Controllers. In: 1st IEEE Conference on Network Softwarization (NetSoft)
-
Scott-Hayward S (2015) Design and deployment of secure, robust, and resilient SDN Controllers. In: 1st IEEE Conference on Network Softwarization (NetSoft), pp 1–5
-
(2015)
pp 1–5
-
-
Scott-Hayward, S.1
-
43
-
-
84922330810
-
Byzantine-resilient secure software-defined networks with multiple controllers in cloud
-
Li H, Li P, Guo S, Nayak A (2014) Byzantine-resilient secure software-defined networks with multiple controllers in cloud. IEEE Trans Cloud Comput 2(4):436–447
-
(2014)
IEEE Trans Cloud Comput
, vol.2
, Issue.4
, pp. 436-447
-
-
Li, H.1
Li, P.2
Guo, S.3
Nayak, A.4
-
44
-
-
84904186178
-
Disco: distributed multi-domain sdn controllers. In: IEEE Network Operations and Management Symposium (NOMS)
-
Phemius K, Bouet M, Leguay J (2014) Disco: distributed multi-domain sdn controllers. In: IEEE Network Operations and Management Symposium (NOMS), pp 1–4
-
(2014)
pp 1–4
-
-
Phemius, K.1
Bouet, M.2
Leguay, J.3
-
45
-
-
84990888419
-
Developing floodlight modules. floodlight OpenFlow controller Tech
-
Big Switch Inc. (2012) Developing floodlight modules. floodlight OpenFlow controller Tech. Rep.
-
(2012)
Rep
-
-
Inc, B.S.1
-
46
-
-
84990995771
-
-
Advanced message queuing protocol. [Online].
-
Advanced message queuing protocol. [Online]. Available: http://www.amqp.org
-
-
-
-
47
-
-
84866479468
-
Scalable software defined network controllers
-
Conference on Applications, Technologies: Architectures, and Protocols for Computer Communication
-
Voellmy A, Wang J (2012) Scalable software defined network controllers. In: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp 289–290
-
(2012)
Proceedings of the ACM SIGCOMM
, vol.2012
, pp. 289-290
-
-
Voellmy, A.1
Wang, J.2
-
48
-
-
84888111404
-
HyperFlow: a distributed control plane for OpenFlow
-
Internet Network Management Conference on Research on Enterprise Networking, USENIX Association
-
Tootoonchian A, Ganjali Y (2010) HyperFlow: a distributed control plane for OpenFlow. In: Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking. USENIX Association, pp 3–3
-
(2010)
Proceedings of the
, vol.2010
, pp. 3
-
-
Tootoonchian, A.1
Ganjali, Y.2
-
49
-
-
84944193150
-
Leveraging software-defined networking for security policy enforcement
-
Liu J et al (2016) Leveraging software-defined networking for security policy enforcement. Inf Sci 327:288–299
-
(2016)
Inf Sci
, vol.327
, pp. 288-299
-
-
Liu, J.1
-
50
-
-
84866480420
-
The controller placement problem. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ACM
-
Heller B, Sherwood R, McKeown N (2012) The controller placement problem. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ACM, pp 7–12
-
(2012)
pp 7–12
-
-
Heller, B.1
Sherwood, R.2
McKeown, N.3
-
51
-
-
84893599943
-
Dynamic controller provisioning in software defined networks. In: 2013 9th IEEE International Conference on Network and Service Management (CNSM)
-
Bari MF, Roy AR, Chowdhury SR, Zhang Q, Zhani MF, Ahmed R, Boutaba R (2013) Dynamic controller provisioning in software defined networks. In: 2013 9th IEEE International Conference on Network and Service Management (CNSM), pp 18–25
-
(2013)
pp 18–25
-
-
Bari, M.F.1
Roy, A.R.2
Chowdhury, S.R.3
Zhang, Q.4
Zhani, M.F.5
Ahmed, R.6
Boutaba, R.7
-
52
-
-
84892633148
-
Pareto-optimal resilient controller placement in SDN-based core networks. In: 25th IEEE International Conference on Teletraffic Congress (ITC)
-
Hock D, Hartmann M, Gebert S, Jarschel M, Zinner T, Tran-Gia P (2013) Pareto-optimal resilient controller placement in SDN-based core networks. In: 25th IEEE International Conference on Teletraffic Congress (ITC), pp 1–9
-
(2013)
pp 1–9
-
-
Hock, D.1
Hartmann, M.2
Gebert, S.3
Jarschel, M.4
Zinner, T.5
Tran-Gia, P.6
-
53
-
-
84990944867
-
-
Security-enhanced floodlight. [Online]. Available:. sdncentral.com/education/toward-secure-sdn-controllayer/2013/10/
-
Security-enhanced floodlight. [Online]. Available: http://www. sdncentral.com/education/toward-secure-sdn-controllayer/2013/10/
-
-
-
-
54
-
-
84893570087
-
FRESCO: Modular Composable Security Services for Software-Defined Networks
-
Shin S, Porras P, Yegneswaran V, Fong M, Gu G, Tyson M (2013) FRESCO: Modular Composable Security Services for Software-Defined Networks. In: Proceedings of Network and Distributed Security Symposium, pp 1-16
-
(2013)
In: Proceedings of Network and Distributed Security Symposium
, pp. 1-16
-
-
Shin, S.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Gu, G.5
Tyson, M.6
-
56
-
-
84883671159
-
Towards secure and dependable software-defined networks. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
-
Kreutz D, Ramos F, Verissimo P (2013) Towards secure and dependable software-defined networks. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp 55–60
-
(2013)
pp 55–60
-
-
Kreutz, D.1
Ramos, F.2
Verissimo, P.3
-
57
-
-
84883723129
-
Towards a secure controller platform for openflow applications. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
-
Wen X, Chen Y, Hu C, Shi C, Wang Y (2013) Towards a secure controller platform for openflow applications. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp 171–172
-
(2013)
pp 171–172
-
-
Wen, X.1
Chen, Y.2
Hu, C.3
Shi, C.4
Wang, Y.5
-
59
-
-
84877624157
-
Verifiably-safe software-defined networks for CPS. In: Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems, pp
-
Skowyra R, Lapets A, Bestavros A, Kfoury A (2013) Verifiably-safe software-defined networks for CPS. In: Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems, pp. 101–110
-
(2013)
101–110
-
-
Skowyra, R.1
Lapets, A.2
Bestavros, A.3
Kfoury, A.4
-
60
-
-
84901611022
-
Vericon: towards verifying controller programs in software-defined networks
-
Ball T, Bjmer N, Gember A, Itzhaky S, Karbyshev A, Sagiv M, Valadarsky A (2014) Vericon: towards verifying controller programs in software-defined networks. ACM SIGPLAN Not 49(6):282–293
-
(2014)
ACM SIGPLAN Not
, vol.49
, Issue.6
, pp. 282-293
-
-
Ball, T.1
Bjmer, N.2
Gember, A.3
Itzhaky, S.4
Karbyshev, A.5
Sagiv, M.6
Valadarsky, A.7
-
61
-
-
84891358075
-
I.E. International Conference on Communications (ICC)
-
Son S, Shin S, Yegneswaran V, Porras P, Gu G (2013) Model checking invariant security properties in OpenFlow. In: 2013 I.E. International Conference on Communications (ICC), pp 1974–1979
-
(2013)
pp 1974–1979
-
-
Son, S.1
Shin, S.2
Yegneswaran, V.3
Porras, P.4
-
62
-
-
80053150074
-
Debugging the data plane with anteater
-
Mai H, Khurshid A, Agarwal R, Caesar M, Godfrey P, King S (2011) Debugging the data plane with anteater. ACM SIGCOMM Comput Commun Rev 41(4):290–301
-
(2011)
ACM SIGCOMM Comput Commun Rev
, vol.41
, Issue.4
, pp. 290-301
-
-
Mai, H.1
Khurshid, A.2
Agarwal, R.3
Caesar, M.4
Godfrey, P.5
King, S.6
-
63
-
-
85076709056
-
Real time network policy checking using header space analysis. In: USENIX Symposium on Networked Systems Design and Implementation
-
Kazemian P, Chan M, Zeng H, Varghese G, McKeown N, Whyte S (2013) Real time network policy checking using header space analysis. In: USENIX Symposium on Networked Systems Design and Implementation, pp 99–111
-
(2013)
pp 99–111
-
-
Kazemian, P.1
Chan, M.2
Zeng, H.3
Varghese, G.4
McKeown, N.5
Whyte, S.6
-
64
-
-
85074798835
-
Header space analysis: static checking for networks. In: USENIX Symposium on Networked Systems Design and Implementation NSDI
-
Kazemian P, Varghese G, McKeown N (2012) Header space analysis: static checking for networks. In: USENIX Symposium on Networked Systems Design and Implementation NSDI, pp 113–126
-
(2012)
pp 113–126
-
-
Kazemian, P.1
Varghese, G.2
McKeown, N.3
-
65
-
-
84894196540
-
Towards a security-enhanced firewall application for openflow networks. In: Cyberspace Safety and Security, Springer International Publishing, pp
-
Wang J, Wang Y, Hu H, Sun Q, Shi H, Zeng L (2013) Towards a security-enhanced firewall application for openflow networks. In: Cyberspace Safety and Security, Springer International Publishing, pp. 92–103
-
(2013)
92–103
-
-
Wang, J.1
Wang, Y.2
Hu, H.3
Sun, Q.4
Shi, H.5
Zeng, L.6
|