TeFENS: Testbed For Experimenting Next-Generation-Network Security
暂无分享,去创建一个
[1] S. Mercy Shalinie,et al. SLAMHHA: A supervised learning approach to mitigate host location hijacking attack on SDN controllers , 2017, 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN).
[2] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[3] Jin Cao,et al. A secure SDN based multi-RANs architecture for future 5G networks , 2017, Comput. Secur..
[4] Nicola Blefari-Melazzi,et al. A framework for experimenting ICN over SDN solutions using physical and virtual testbeds , 2018, Comput. Networks.
[5] Russell J. Clark,et al. Advancing Software-Defined Networks: A Survey , 2017, IEEE Access.
[6] AKHIL GUPTA,et al. A Survey of 5G Network: Architecture and Emerging Technologies , 2015, IEEE Access.
[7] Toni Janevski,et al. 5G and the Fog — Survey of related technologies and research directions , 2016, 2016 18th Mediterranean Electrotechnical Conference (MELECON).
[8] Fernando A. Kuipers,et al. SDN and Virtualization Solutions for the Internet of Things: A Survey , 2016, IEEE Access.
[9] Carynthia Kharkongor,et al. A SDN Controller with Energy Efficient Routing in the Internet of Things (IoT) , 2016 .
[10] Athanasios V. Vasilakos,et al. Large-scale MIMO-based wireless backhaul in 5G networks , 2015, IEEE Wireless Communications.
[11] Antonios Argyriou,et al. Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..
[12] Shahid Mumtaz,et al. A survey of 5G technologies: regulatory, standardization and industrial perspectives , 2017, Digit. Commun. Networks.
[13] Raimo Kantola,et al. Enhancing Security of Software Defined Mobile Networks , 2017, IEEE Access.
[14] Mohsen Guizani,et al. Smart Cities: A Survey on Data Management, Security, and Enabling Technologies , 2017, IEEE Communications Surveys & Tutorials.
[15] Zoraida Frias,et al. 5G networks: Will technology and policy collide? , 2017, Telecommunications Policy.
[16] Bing Chen,et al. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.
[17] Athanasios V. Vasilakos,et al. Full duplex techniques for 5G networks: self-interference cancellation, protocol design, and relay selection , 2015, IEEE Communications Magazine.