A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks
暂无分享,去创建一个
[1] Omprakash Kaiwartya,et al. Cache agent-based geocasting in VANETs , 2015, Int. J. Inf. Commun. Technol..
[2] Andrei V. Gurtov,et al. Securing the control channel of software-defined mobile networks , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[3] Sakir Sezer,et al. A Survey of Security in Software Defined Networks , 2016, IEEE Communications Surveys & Tutorials.
[4] Nor Badrul Anuar,et al. Secure and dependable software defined networks , 2016, J. Netw. Comput. Appl..
[5] Guofei Gu,et al. Attacking software-defined networks: a first feasibility study , 2013, HotSDN '13.
[6] Vainius Dangovas,et al. SDN-Driven Authentication and Access Control System , 2014 .
[7] Amardeep Singh,et al. Introducing Restricted Access Protocol To Enhance The Security And Eliminate Ddos Attack , 2016 .
[8] Jun Bi,et al. Source address validation solution with OpenFlow/NOX architecture , 2011, 2011 19th IEEE International Conference on Network Protocols.
[9] Dianxiang Xu,et al. Security of Software Defined Networks: A survey , 2015, Comput. Secur..
[10] Abdul Hanan Abdullah,et al. Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks , 2014, Sensors.
[11] T. Moore,et al. Bitcoin: Economics, Technology, and Governance , 2014 .
[12] Qi Hao,et al. A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation , 2014, IEEE Communications Surveys & Tutorials.
[13] Jeremy Clark,et al. CommitCoin: Carbon Dating Commitments with Bitcoin - (Short Paper) , 2012, Financial Cryptography.
[14] Jörg Becker,et al. Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency , 2012, WEIS.
[15] Kostas Pentikousis,et al. C-BAS: Certificate-Based AAA for SDN Experimental Facilities , 2014, 2014 Third European Workshop on Software Defined Networks.