-
1
-
-
85022063825
-
-
Mausezahn
-
Mausezahn. http://www.perihel.at/sec/mz/.
-
-
-
-
2
-
-
85021994531
-
-
Open Networking Foundation (ONF)
-
Open Networking Foundation (ONF). https://www.opennetworking.org/.
-
-
-
-
3
-
-
85027917582
-
A survey of securing networks using software defied networking
-
S. T. Ali, V. Sivaraman, A. Radford, and S. Jha. A survey of securing networks using software defied networking. IEEE transactions on reliability, 64(3):1086-1097, 2015.
-
(2015)
IEEE transactions on reliability
, vol.64
, Issue.3
, pp. 1086-1097
-
-
Ali, S.T.1
Sivaraman, V.2
Radford, A.3
Jha, S.4
-
4
-
-
70350370011
-
A visual analytics toolkit for cluster-based classification of mobility data
-
Springer
-
G. Andrienko, N. Andrienko, S. Rinzivillo, M. Nanni, and D. Pedreschi. A visual analytics toolkit for cluster-based classification of mobility data. In International Symposium on Spatial and Temporal Databases, pages 432-435. Springer, 2009.
-
(2009)
International Symposium on Spatial and Temporal Databases
, pp. 432-435
-
-
Andrienko, G.1
Andrienko, N.2
Rinzivillo, S.3
Nanni, M.4
Pedreschi, D.5
-
5
-
-
72849142812
-
Interactive visual clustering of large collections of trajectories
-
IEEE
-
G. Andrienko, N. Andrienko, S. Rinzivillo, M. Nanni, D. Pedreschi, and F. Giannotti. Interactive visual clustering of large collections of trajectories. In Visual Analytics Science and Technology, 2009. VAST 2009. IEEE Symposium on, pages 3-10. IEEE, 2009.
-
(2009)
Visual Analytics Science and Technology, 2009. VAST 2009. IEEE Symposium on
, pp. 3-10
-
-
Andrienko, G.1
Andrienko, N.2
Rinzivillo, S.3
Nanni, M.4
Pedreschi, D.5
Giannotti, F.6
-
7
-
-
85021940694
-
-
Cbench
-
Cbench. https://goo.gl/10TLJk.
-
-
-
-
8
-
-
84979967261
-
Securing data planes in software-defied networks
-
IEEE
-
T.-W. Chao, Y.-M. Ke, B.-H. Chen, J.-L. Chen, C. J. Hsieh, S.-C. Lee, and H.-C. Hsiao. Securing data planes in software-defied networks. In 2016 IEEE NetSoft Conference and Workshops (NetSoft), pages 465-470. IEEE, 2016.
-
(2016)
2016 IEEE NetSoft Conference and Workshops (NetSoft
, pp. 465-470
-
-
Chao, T.-W.1
Ke, Y.-M.2
Chen, B.-H.3
Chen, J.-L.4
Hsieh, C.J.5
Lee, S.-C.6
Hsiao, H.-C.7
-
9
-
-
85021887300
-
-
CRATE datasets
-
CRATE datasets. ftp://download.iwlab.foi.se/dataset.
-
-
-
-
10
-
-
85021969908
-
-
Data Set for IMC 2010 Data Center Measurement
-
Data Set for IMC 2010 Data Center Measurement. http://pages.cs.wisc.edu/~tbenson/IMC10 Data.html.
-
-
-
-
11
-
-
84943292313
-
Sphinx: Detecting security attacks in software-defied networks
-
M. Dhawan, R. Poddar, K. Mahajan, and V. Mann. Sphinx: Detecting security attacks in software-defied networks. In NDSS, 2015.
-
(2015)
NDSS
-
-
Dhawan, M.1
Poddar, R.2
Mahajan, K.3
Mann, V.4
-
14
-
-
36849001879
-
Trajectory pattern mining
-
ACM
-
F. Giannotti, M. Nanni, F. Pinelli, and D. Pedreschi. Trajectory pattern mining. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 330-339. ACM, 2007.
-
(2007)
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
, pp. 330-339
-
-
Giannotti, F.1
Nanni, M.2
Pinelli, F.3
Pedreschi, D.4
-
15
-
-
84945273945
-
I know what your packet did last hop: Using packet histories to troubleshoot networks
-
N. Handigol, B. Heller, V. Jeyakumar, D. Mazifferes, and N. McKeown. I know what your packet did last hop: Using packet histories to troubleshoot networks. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), pages 71-85, 2014.
-
(2014)
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14
, pp. 71-85
-
-
Handigol, N.1
Heller, B.2
Jeyakumar, V.3
Mazifferes, D.4
McKeown, N.5
-
16
-
-
41749102176
-
Pakistan youtube block exposes fundamental internet security weakness: Concern that pakistani action affected youtube access elsewhere in world
-
P. Hunter. Pakistan youtube block exposes fundamental internet security weakness: Concern that pakistani action affected youtube access elsewhere in world. Computer Fraud & Security, 2008(4):10-11, 2008.
-
(2008)
Computer Fraud & Security
, vol.4
, Issue.10-11
, pp. 2008
-
-
Hunter, P.1
-
18
-
-
85076709056
-
Real time network policy checking using header space analysis
-
P. Kazemian, M. Chang, H. Zeng, G. Varghese, N. McKeown, and S. Whyte. Real time network policy checking using header space analysis. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), pages 99-111, 2013.
-
(2013)
Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13
, pp. 99-111
-
-
Kazemian, P.1
Chang, M.2
Zeng, H.3
Varghese, G.4
McKeown, N.5
Whyte, S.6
-
20
-
-
85076705859
-
Veriow: Verifying network-wide invariants in real time
-
A. Khurshid, X. Zou, W. Zhou, M. Caesar, and P. B. Godfrey. Veriow: Verifying network-wide invariants in real time. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), pages 15-27, 2013.
-
(2013)
Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13
, pp. 15-27
-
-
Khurshid, A.1
Zou, X.2
Zhou, W.3
Caesar, M.4
Godfrey, P.B.5
-
21
-
-
84907362997
-
Lightweight source authentication and path validation
-
ACM
-
T. H.-J. Kim, C. Basescu, L. Jia, S. B. Lee, Y.-C. Hu, and A. Perrig. Lightweight source authentication and path validation. In ACM SIGCOMM Computer Communication Review, volume 44, pages 271-282. ACM, 2014.
-
(2014)
ACM SIGCOMM Computer Communication Review
, vol.44
, pp. 271-282
-
-
Kim, T.H.-J.1
Basescu, C.2
Jia, L.3
Lee, S.B.4
Hu, Y.-C.5
Perrig, A.6
-
23
-
-
80053642599
-
The internet topology zoo
-
S. Knight, H. X. Nguyen, N. Falkner, R. Bowden, and M. Roughan. The internet topology zoo. IEEE Journal on Selected Areas in Communications, 29(9):1765-1775, 2011.
-
(2011)
IEEE Journal on Selected Areas in Communications
, vol.29
, Issue.9
, pp. 1765-1775
-
-
Knight, S.1
Nguyen, H.X.2
Falkner, N.3
Bowden, R.4
Roughan, M.5
-
25
-
-
84919935425
-
Software-defied networking: A comprehensive survey
-
D. Kreutz, F. M. Ramos, P. E. Verissimo, C. E. Rothenberg, S. Azodolmolky, and S. Uhlig. Software-defied networking: A comprehensive survey. Proceedings of the IEEE, 103(1):14-76, 2015.
-
(2015)
Proceedings of the IEEE
, vol.103
, Issue.1
, pp. 14-76
-
-
Kreutz, D.1
Ramos, F.M.2
Verissimo, P.E.3
Rothenberg, C.E.4
Azodolmolky, S.5
Uhlig, S.6
-
26
-
-
85021860688
-
-
LBNL/ICSI Enterprise Tracing Project
-
LBNL/ICSI Enterprise Tracing Project. http://www.icir.org/enterprise-tracing/.
-
-
-
-
28
-
-
80053150074
-
Debugging the data plane with anteater
-
ACM
-
H. Mai, A. Khurshid, R. Agarwal, M. Caesar, P. Godfrey, and S. T. King. Debugging the data plane with anteater. In ACM SIGCOMM Computer Communication Review, volume 41, pages 290-301. ACM, 2011.
-
(2011)
ACM SIGCOMM Computer Communication Review
, vol.41
, pp. 290-301
-
-
Mai, H.1
Khurshid, A.2
Agarwal, R.3
Caesar, M.4
Godfrey, P.5
King, S.T.6
-
29
-
-
68649129121
-
Openow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. Openow: Enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 38(2):69-74, 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
30
-
-
44149128677
-
Scaling breakdown in ow uctuations on complex networks
-
S. Meloni, J. Gomez-Gardenes, V. Latora, and Y. Moreno. Scaling breakdown in ow uctuations on complex networks. Physical review letters, 100(20):208701, 2008.
-
(2008)
Physical review letters
, vol.100
, Issue.20
, pp. 208701
-
-
Meloni, S.1
Gomez-Gardenes, J.2
Latora, V.3
Moreno, Y.4
-
31
-
-
27544472999
-
Fatih: Detecting and isolating malicious routers
-
IEEE
-
A. T. Mizrak, Y.-C. Cheng, K. Marzullo, and S. Savage. Fatih: Detecting and isolating malicious routers. In 2005 International Conference on Dependable Systems and Networks (DSN'05), pages 538-547. IEEE, 2005.
-
(2005)
2005 International Conference on Dependable Systems and Networks (DSN'05
, pp. 538-547
-
-
Mizrak, A.T.1
Cheng, Y.-C.2
Marzullo, K.3
Savage, S.4
-
32
-
-
85008065214
-
Detecting malicious packet losses
-
A. T. Mizrak, S. Savage, and K. Marzullo. Detecting malicious packet losses. IEEE Transactions on Parallel and distributed systems, 20(2):191-206, 2009.
-
(2009)
IEEE Transactions on Parallel and distributed systems
, vol.20
, Issue.2
, pp. 191-206
-
-
Mizrak, A.T.1
Savage, S.2
Marzullo, K.3
-
33
-
-
85021879925
-
-
Open Networking Foundation (ONF). Sdn architecture, onf tr-502
-
Open Networking Foundation (ONF). Sdn architecture, onf tr-502. opennetworking.org/images/stories/downloads/sdn-resources/technical-reports/TR SDN ARCH 1.0 06062014.pdf.
-
-
-
-
34
-
-
77951243867
-
Sndlib 1.0-survivable network design library
-
S. Orlowski, R. Wessäly, M. Pioro, and A. Tomaszewski. Sndlib 1.0-survivable network design library. Networks, 55(3):276-286, 2010.
-
(2010)
Networks
, vol.55
, Issue.3
, pp. 276-286
-
-
Orlowski, S.1
Wessäly, R.2
Pioro, M.3
Tomaszewski, A.4
-
35
-
-
77958027221
-
Unsupervised trajectory sampling
-
Springer
-
N. Pelekis, I. Kopanakis, C. Panagiotakis, and Y. Theodoridis. Unsupervised trajectory sampling. In Machine learning and knowledge discovery in databases, pages 17-33. Springer, 2010.
-
(2010)
Machine learning and knowledge discovery in databases
, pp. 17-33
-
-
Pelekis, N.1
Kopanakis, I.2
Panagiotakis, C.3
Theodoridis, Y.4
-
36
-
-
84924376535
-
Planck: Millisecond-scale monitoring and control for commodity networks
-
J. Rasley, B. Stephens, C. Dixon, E. Rozner, W. Felter, K. Agarwal, J. Carter, and R. Fonseca. Planck: Millisecond-scale monitoring and control for commodity networks. ACM SIGCOMM Computer Communication Review, 44(4):407-418, 2015.
-
(2015)
ACM SIGCOMM Computer Communication Review
, vol.44
, Issue.4
, pp. 407-418
-
-
Rasley, J.1
Stephens, B.2
Dixon, C.3
Rozner, E.4
Felter, W.5
Agarwal, K.6
Carter, J.7
Fonseca, R.8
-
37
-
-
85022088066
-
-
Route Views
-
Route Views. http://www.routeviews.org.
-
-
-
-
38
-
-
84962446555
-
A survey of security in software defied networks
-
S. Scott-Hayward, S. Natarajan, and S. Sezer. A survey of security in software defied networks. IEEE Communications Surveys & Tutorials, 18(1):623-654, 2015.
-
(2015)
IEEE Communications Surveys & Tutorials
, vol.18
, Issue.1
, pp. 623-654
-
-
Scott-Hayward, S.1
Natarajan, S.2
Sezer, S.3
-
39
-
-
1642408605
-
Measuring ISP topologies with rocketfuel
-
N. Spring, R. Mahajan, D. Wetherall, and T. Anderson. Measuring isp topologies with rocketfuel. IEEE/ACM Transactions on networking, 12(1):2-16, 2004.
-
(2004)
IEEE/ACM Transactions on networking
, vol.12
, Issue.1
, pp. 2-16
-
-
Spring, N.1
Mahajan, R.2
Wetherall, D.3
Anderson, T.4
-
40
-
-
84907733368
-
Opensample: A low-latency, sampling-based measurement platform for commodity SDN
-
IEEE
-
J. Suh, T. T. Kwon, C. Dixon, W. Felter, and J. Carter. Opensample: A low-latency, sampling-based measurement platform for commodity sdn. In Distributed Computing Systems (ICDCS), 2014 IEEE 34th International Conference on, pages 228-237. IEEE, 2014.
-
(2014)
Distributed Computing Systems (ICDCS), 2014 IEEE 34th International Conference on
, pp. 228-237
-
-
Suh, J.1
Kwon, T.T.2
Dixon, C.3
Felter, W.4
Carter, J.5
-
41
-
-
85076893271
-
Libra: Divide and conquer to verify forwarding tables in huge networks
-
H. Zeng, S. Zhang, F. Ye, V. Jeyakumar, M. Ju, J. Liu, N. McKeown, and A. Vahdat. Libra: Divide and conquer to verify forwarding tables in huge networks. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), pages 87-99, 2014.
-
(2014)
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14
, pp. 87-99
-
-
Zeng, H.1
Zhang, S.2
Ye, F.3
Jeyakumar, V.4
Ju, M.5
Liu, J.6
McKeown, N.7
Vahdat, A.8
-
42
-
-
84878355953
-
Secure and scalable fault localization under dynamic trafic patterns
-
IEEE
-
X. Zhang, C. Lan, and A. Perrig. Secure and scalable fault localization under dynamic trafic patterns. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 317-331. IEEE, 2012.
-
(2012)
Security and Privacy (SP), 2012 IEEE Symposium on
, pp. 317-331
-
-
Zhang, X.1
Lan, C.2
Perrig, A.3
-
43
-
-
85180801198
-
Shortmac: Eficient data-plane fault localization
-
X. Zhang, Z. Zhou, H.-C. Hsiao, T. H.-J. Kim, A. Perrig, and P. Tague. Shortmac: Eficient data-plane fault localization. In NDSS, 2012.
-
(2012)
NDSS
-
-
Zhang, X.1
Zhou, Z.2
Hsiao, H.-C.3
Kim, T.H.-J.4
Perrig, A.5
Tague, P.6
-
44
-
-
12344263831
-
On making TCP robust against spurious retransmissions
-
Y. J. Zhu and L. Jacob. On making tcp robust against spurious retransmissions. Computer communications, 28(1):25-36, 2005.
-
(2005)
Computer communications
, vol.28
, Issue.1
, pp. 25-36
-
-
Zhu, Y.J.1
Jacob, L.2
|