-
2
-
-
84994380369
-
-
Mike lynn's 'exploit', in plain (non-technical) english Accessed: 7/30/2015
-
Mike lynn's 'exploit', in plain (non-technical) english. http://bit.ly/10zx5ou. Accessed: 7/30/2015.
-
-
-
-
5
-
-
84994219013
-
-
OpenDaylight Platform Accessed: 7/30/2015
-
OpenDaylight Platform. http://bit.ly/1HJi57D. Accessed: 7/30/2015.
-
-
-
-
6
-
-
84994295635
-
-
ONOS Accessed: 7/30/2015
-
ONOS. http://bit.ly/1KrvSl9. Accessed: 7/30/2015.
-
-
-
-
7
-
-
84994331192
-
-
HP SDN App Store Accessed: 7/30/2015
-
HP SDN App Store. https://hpn.hpwsportal.com/catalog.html. Accessed: 7/30/2015.
-
-
-
-
9
-
-
84883723129
-
Towards a secure controller platform for openflow applications
-
Xitao Wen, Yan Chen, Chengchen Hu, Chao Shi, and Yi Wang. Towards a secure controller platform for openflow applications. In HotSDN'13.
-
HotSDN'13
-
-
Wen, X.1
Chen, Y.2
Hu, C.3
Shi, C.4
Wang, Y.5
-
10
-
-
84994371068
-
Rosemary: A robust, secure, and high-performance network operating system
-
etc
-
Seungwon Shin, Yongjoo Song, Taekyung Lee, and etc. Rosemary: A robust, secure, and high-performance network operating system. In CCS '14.
-
CCS
, vol.14
-
-
Shin, S.1
Song, Y.2
Lee, T.3
-
11
-
-
85049403057
-
Securing the software-defined network control layer
-
Phillip Porras, Steven Cheung, et al. Securing the Software-Defined Network Control Layer. In NDSS, 2015.
-
(2015)
NDSS
-
-
Porras, P.1
Cheung, S.2
-
12
-
-
84893570087
-
Fresco: Modular composable security services for software-defined networks
-
S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, and M. Tyson. Fresco: Modular composable security services for software-defined networks. In NDSS'13.
-
NDSS'13
-
-
Shin, S.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Gu, G.5
Tyson, M.6
-
13
-
-
84994219000
-
CoVisor: A compositional hypervisor for software-defined networks
-
Xin Jin, Jennifer Gossels, Jennifer Rexford, and David Walker. CoVisor: A Compositional Hypervisor for Software-Defined Networks. In USENIX NSDI'15.
-
USENIX NSDI'15
-
-
Jin, X.1
Gossels, J.2
Rexford, J.3
Walker, D.4
-
14
-
-
84994279970
-
-
Flood Light Open Flow controller Accessed: 7/30/2015
-
Flood Light Open Flow controller. http://bit.ly/UIL73z. Accessed: 7/30/2015.
-
-
-
-
16
-
-
84866518191
-
A security enforcement kernel for openflow networks
-
P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu. A security enforcement kernel for openflow networks. In HotSDN'12.
-
HotSDN'12
-
-
Porras, P.1
Shin, S.2
Yegneswaran, V.3
Fong, M.4
Tyson, M.5
Gu, G.6
-
18
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
ACM
-
Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, and David Lie. Pscout: analyzing the android permission specification. In CCS 2012. ACM.
-
(2012)
CCS
-
-
Wain Yee Au, K.1
Fan Zhou, Y.2
Huang, Z.3
Lie, D.4
-
19
-
-
84893330207
-
Permlyzer: Analyzing permission usage in android applications
-
IEEE
-
Wei Xu, Fangfang Zhang, and Sencun Zhu. Permlyzer: Analyzing permission usage in android applications. In ISSRE 2013. IEEE.
-
(2013)
ISSRE
-
-
Xu, W.1
Zhang, F.2
Zhu, S.3
-
20
-
-
84994227609
-
-
AirWatch Accessed: 7/30/2015
-
AirWatch. http://www.air-watch.com/. Accessed: 7/30/2015.
-
-
-
-
21
-
-
84994230121
-
-
Citrix XenMobile Accessed: 7/30/2015
-
Citrix XenMobile. https://www.citrix.com/xenmobile/. Accessed: 7/30/2015.
-
-
-
-
22
-
-
79551600395
-
Nettle: Taking the sting out of programming network routers
-
Andreas Voellmy and Paul Hudak. Nettle: Taking the sting out of programming network routers. In PADL, pages 235-249, 2011.
-
(2011)
PADL
, pp. 235-249
-
-
Voellmy, A.1
Hudak, P.2
-
23
-
-
84866510736
-
Procera: A language for high-level reactive network control
-
Andreas Voellmy, Hyojoon Kim, and Nick Feamster. Procera: a language for high-level reactive network control. In Proceedings of HotSDN 2012.
-
(2012)
Proceedings of HotSDN
-
-
Voellmy, A.1
Kim, H.2
Feamster, N.3
-
25
-
-
84873907522
-
Languages for software-defined networks
-
Nate Foster, Arjun Guha, et al. Languages for software-defined networks. Communications Magazine, IEEE, 51(2):128-134, 2013.
-
(2013)
Communications Magazine IEEE
, vol.51
, Issue.2
, pp. 128-134
-
-
Foster, N.1
Guha, A.2
-
27
-
-
84994224040
-
Netkat: Semantic foundations for networks
-
Carolyn Jane Anderson, Nate Foster, et al. Netkat: Semantic foundations for networks. In POPL '14.
-
POPL
, vol.14
-
-
Jane Anderson, C.1
Foster, N.2
-
28
-
-
84994380313
-
-
Cbench controller benchmarker Accessed: 7/30/2015
-
Cbench controller benchmarker. http://bit.ly/YyICCs. Accessed: 7/30/2015.
-
-
-
-
30
-
-
84907010648
-
OpenVirteX: Make your virtual SDNs programmable
-
Ali Al-Shabibi, Marc De Leenheer, et al. OpenVirteX: Make Your Virtual SDNs Programmable. HotSDN '14.
-
HotSDN '14
-
-
Al-Shabibi, A.1
De Leenheer, M.2
-
31
-
-
85051175818
-
Network virtualization in multi-tenant datacenters
-
Teemu Koponen, Keith Amidon, et al. Network virtualization in multi-tenant datacenters. In NSDI, 2014.
-
(2014)
NSDI
-
-
Koponen, T.1
Amidon, K.2
-
32
-
-
84872237738
-
Vertigo: Network virtualization and beyond
-
Roberto Doriguzzi Corin, Matteo Gerola, et al. Vertigo: network virtualization and beyond. In EWSDN. IEEE, 2012.
-
(2012)
EWSDN. IEEE
-
-
Doriguzzi Corin, R.1
Gerola, M.2
-
34
-
-
85076709056
-
Real time network policy checking using header space analysis
-
etc
-
Peyman Kazemian, Michael Chan, and etc. Real time network policy checking using header space analysis. In NSDI, pages 99-111, 2013.
-
(2013)
NSDI
, pp. 99-111
-
-
Kazemian, P.1
Chan, M.2
-
35
-
-
0003262137
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
etc
-
Peter A Loscocco, Stephen D Smalley, and etc. The inevitability of failure: The flawed assumption of security in modern computing environments. In NISSC, 1998.
-
(1998)
NISSC
-
-
Loscocco, P.A.1
Smalley, S.D.2
-
36
-
-
0028513932
-
Access control: Principle and practice
-
Ravi S Sandhu and Pierangela Samarati. Access control: principle and practice. Communications Magazine, IEEE, 32(9):40-48, 1994.
-
(1994)
Communications Magazine IEEE
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
38
-
-
85091276968
-
Security Enhanced (SE) Android: Bringing Flexible MAC to Android
-
Stephen Smalley and Robert Craig. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. In NDSS, volume 310, pages 20-38, 2013.
-
(2013)
NDSS
, vol.310
, pp. 20-38
-
-
Smalley, S.1
Craig, R.2
-
39
-
-
84887367827
-
Dr. Android and mr. Hide: Fine-grained permissions in android applications
-
ACM
-
Jinseong Jeon, Kristopher K Micinski, et al. Dr. android and mr. hide: fine-grained permissions in android applications. In SPSM 2012. ACM.
-
(2012)
SPSM
-
-
Jeon, J.1
Micinski, K.K.2
-
40
-
-
85180547159
-
What's in your dongle and bank account? Mandatory and discretionary protection of android external resources
-
Soteris Demetriou, Xiaoyong Zhou, et al. What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. In NDSS, 2015.
-
(2015)
NDSS
-
-
Demetriou, S.1
Zhou, X.2
-
42
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
A.P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android permissions: User attention, comprehension, and behavior. In SOUPS, 2012.
-
(2012)
SOUPS
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
43
-
-
84857889275
-
A compiler and run-time system for network programming languages
-
ACM
-
Christopher Monsanto, Nate Foster, Rob Harrison, and David Walker. A compiler and run-time system for network programming languages. In ACM SIGPLAN Notices, volume 47, pages 217-230. ACM, 2012.
-
(2012)
ACM SIGPLAN Notices
, vol.47
, pp. 217-230
-
-
Monsanto, C.1
Foster, N.2
Harrison, R.3
Walker, D.4
|