A Dynamic Timeout Control Algorithm in Software Defined Networks

[1]  Fang Hao,et al.  Towards an elastic distributed SDN controller , 2013, HotSDN '13.

[2]  Alfredo De Santis,et al.  A note on time-bound hierarchical key assignment schemes , 2013, Inf. Process. Lett..

[3]  Sujata Banerjee,et al.  DevoFlow: scaling flow management for high-performance networks , 2011, SIGCOMM.

[4]  Daniel Alonso Martinez,et al.  A verification of selected properties of Telecommunication traffic generated by OPNET simulator , 2011 .

[5]  David A. Maltz,et al.  Network traffic characteristics of data centers in the wild , 2010, IMC '10.

[6]  Martín Casado,et al.  Onix: A Distributed Control Platform for Large-scale Production Networks , 2010, OSDI.

[7]  Jia Wang,et al.  Scalable flow-based networking with DIFANE , 2010, SIGCOMM '10.

[8]  Albert G. Greenberg,et al.  The nature of data center traffic: measurements & analysis , 2009, IMC '09.

[9]  Nick McKeown,et al.  OpenFlow: enabling innovation in campus networks , 2008, CCRV.

[10]  Jyh-haw Yeh,et al.  A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem , 2008, Inf. Process. Lett..

[11]  Alfredo De Santis,et al.  New constructions for provably-secure time-bound hierarchical key assignment schemes , 2007, SACMAT '07.

[12]  Alfredo De Santis,et al.  Enforcing the security of a time-bound hierarchical key assignment scheme , 2006, Inf. Sci..

[13]  Hung-Yu Chen,et al.  Efficient time-bound hierarchical key assignment scheme , 2004 .

[14]  Yiming Ye,et al.  Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy , 2003, IEEE Trans. Knowl. Data Eng..

[15]  Azer Bestavros,et al.  Self-similarity in World Wide Web traffic: evidence and possible causes , 1997, TNET.

[16]  L. Harn,et al.  Refereed article: A cryptographic key generation scheme for multilevel data security , 1990 .

[17]  Ravi S. Sandhu,et al.  Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..

[18]  Selim G. Akl,et al.  An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.

[19]  Selim G. Akl,et al.  Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.

[20]  G. Jenkins,et al.  Time Series Analysis: Forecasting and Control , 1978 .

[21]  H. Akaike Fitting autoregressive models for prediction , 1969 .

[22]  Adam Zarek,et al.  OpenFlow Timeouts Demystied , 2012 .

[23]  Wen-Guey Tzeng,et al.  A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy , 2002, IEEE Trans. Knowl. Data Eng..

[24]  Philippe Olivier,et al.  Flow level IP traffic characterization , 2001 .

[25]  W. Weibull A Statistical Distribution Function of Wide Applicability , 1951 .