메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Securing the Software-Defined Network Control Layer

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; AUTHORIZATION; COMPUTATION THEORY; COMPUTER CIRCUITS; ELECTRIC LIGHTING; FLOODS; NETWORK LAYERS; NETWORK SECURITY; SOFTWARE DEFINED NETWORKING;

EID: 85049403057     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss.2015.23222     Document Type: Conference Paper
Times cited : (199)

References (43)
  • 4
    • 84937877542 scopus 로고    scopus 로고
    • FloodLight
    • FloodLight, “Open SDN controller, ” http://floodlight.openflowhub.org/.
    • Open SDN controller
  • 9
    • 85180550484 scopus 로고    scopus 로고
    • OpenFlowHub
    • OpenFlowHub, “BEACON, ” http://www.openflowhub.org/display/Beacon.
    • BEACON
  • 12
    • 85180551993 scopus 로고    scopus 로고
    • VArmour, http://www.varmour.com/.
    • VArmour
  • 20
    • 84857550070 scopus 로고    scopus 로고
    • Protocol buffers: Google's data interchange format
    • [Online]. Available
    • K. Varda, “Protocol buffers: Google's data interchange format, ” Google, Tech. Rep., 2008. [Online]. Available: http://google-opensource.blogspot.com/2008/07/protocol-buffers-googles-data.html
    • (2008) Google, Tech. Rep
    • Varda, K.1
  • 41
    • 78650109005 scopus 로고    scopus 로고
    • FlowChecker: Configuration Analysis and Verification of Federated Openflow Infrastructures
    • E. Al-Shaer and S. Al-Haj, “FlowChecker: Configuration Analysis and Verification of Federated Openflow Infrastructures, ” in Proceedings of the 3rd ACM SafeConfig Workshop, 2010.
    • (2010) Proceedings of the 3rd ACM SafeConfig Workshop
    • Al-Shaer, E.1    Al-Haj, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.