Autonomic Communications in Software-Driven Networks
暂无分享,去创建一个
Ibrahim Matta | Burkhard Stiller | Mario Gerla | Torsten Braun | Zhongliang Zhao | Nabeel Akhtar | Eryk Schiller | Eirini Kalogeiton | Joshua Joy | Mevlut Turker Garip | M. Gerla | B. Stiller | T. Braun | I. Matta | Zhongliang Zhao | Joshua Joy | Nabeel Akhtar | Eryk Schiller | Eirini Kalogeiton
[1] Hélène Kirchner,et al. A Higher-Order Graph Calculus for Autonomic Computing , 2009, Graph Theory, Computational Intelligence and Thought.
[2] Phan Cong Vinh. An Introduction to the Book Titled "Formal and Practical Aspects of Autonomic Computing and Networking: Specification, Development and Verification" , 2014, EAI Endorsed Trans. Context aware Syst. Appl..
[3] Pedro Casas,et al. Ensemble-learning Approaches for Network Security and Anomaly Detection , 2017, Big-DAMA@SIGCOMM.
[4] Michael G. Hinchey,et al. The Challenge of Developing Autonomic Systems , 2010, Computer.
[5] David W. Chadwick,et al. PERMIS: a modular authorization infrastructure , 2008 .
[6] Guofei Gu,et al. CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?) , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[7] Thanasis Korakis,et al. Network Store: Exploring Slicing in Future 5G Networks , 2015, MobiArch.
[8] Kiyoung Moon,et al. Integration of Single Sign-On and Role-Based Access Control Profiles for Grid Computing , 2006, APWeb.
[9] Lei Zhang,et al. Deployment of Intrusion Prevention System based on Software Defined Networking , 2013, 2013 15th IEEE International Conference on Communication Technology.
[10] Martin Bjorklund,et al. YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF) , 2010 .
[11] Joseph Mitola,et al. Cognitive Radio Architecture Evolution , 2009, Proceedings of the IEEE.
[12] Dijiang Huang,et al. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[13] Basil S. Maglaris,et al. Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments , 2014, Comput. Networks.
[14] Fan Gao,et al. Shibboleth and Community Authorization Services: Enabling Role-Based Grid Access , 2011, ICA3PP.
[15] Jose M. Alcaraz Calero,et al. Keeping an eye on botnets in 5G networks: detection and mitigation by NFV and SDN apps , 2017 .
[16] F. Richard Yu,et al. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.
[17] Basil S. Maglaris,et al. Leveraging SDN for Efficient Anomaly Detection and Mitigation on Legacy Networks , 2014, 2014 Third European Workshop on Software Defined Networks.
[18] Edmund M. Clarke,et al. Model Checking , 1999, Handbook of Automated Reasoning.
[19] John Hughes,et al. Security Assertion Markup Language (SAML) 2.0 Technical Overview , 2004 .
[20] Bruno Sousa,et al. Toward a Fully Cloudified Mobile Network Infrastructure , 2016, IEEE Transactions on Network and Service Management.
[21] Michael L. Littman,et al. Packet Routing in Dynamically Changing Networks: A Reinforcement Learning Approach , 1993, NIPS.
[22] Daniel C. Kilper,et al. Neural Network Based Wavelength Assignment in Optical Switching , 2017, Big-DAMA@SIGCOMM.
[23] Joseph G. Tront,et al. MT6D: A Moving Target IPv6 Defense , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[24] Mianxiong Dong,et al. Control Plane Optimization in Software-Defined Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Vehicular Technology.
[25] Shihong Huang,et al. Autonomic computing and VANET , 2015, SoutheastCon 2015.
[26] Navid Nikaein,et al. Network Slices toward 5G Communications: Slicing the LTE Network , 2017, IEEE Communications Magazine.
[27] JongWon Kim,et al. Scalable network intrusion detection on virtual SDN environment , 2014, 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet).
[28] Mark Needleman. The Shibboleth Authentication/Authorization System , 2004 .
[29] Philip K. McKinley,et al. Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[30] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[31] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[32] Diego Lopez,et al. VNF Pool Orchestration For Automated Resiliency in Service Chains , 2017 .
[33] Franco Zambonelli,et al. Autonomic communication services: a new challenge for software agents , 2008, Autonomous Agents and Multi-Agent Systems.
[34] Mudhakar Srivatsa,et al. Spatio-temporal patterns in network events , 2010, Co-NEXT '10.
[35] Abhijeet Desai,et al. Centralized Control Signature-Based Firewall and Statistical-Based Network Intrusion Detection System (NIDS) in Software Defined Networks (SDN) , 2015 .
[36] Feng Li,et al. Moving Target Defense for Cloud Infrastructures: Lessons from Botnets , 2014 .
[37] Declan O'Sullivan,et al. Towards the knowledge-driven benchmarking of autonomic communications , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[38] Mihaela van der Schaar,et al. Trend-Aware Video Caching Through Online Learning , 2016, IEEE Transactions on Multimedia.
[39] Phan Cong-vinh. Formal and Practical Aspects of Autonomic Computing and Networking: Specification, Development, and Verification , 2011 .
[40] Siddharth Bajaj,et al. Web Services Federation Language (WS- Federation) , 2003 .
[41] David D. Clark,et al. A knowledge plane for the internet , 2003, SIGCOMM '03.
[42] N. Bicocchi,et al. Autonomic communication learns from nature , 2007, IEEE Potentials.
[43] Allen B. MacKenzie,et al. Cognitive networks: adaptation and learning to achieve end-to-end performance objectives , 2006, IEEE Communications Magazine.
[44] Zhu Han,et al. Machine Learning Paradigms for Next-Generation Wireless Networks , 2017, IEEE Wireless Communications.
[45] Mario Gerla,et al. Towards software-defined VANET: Architecture and services , 2014, 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).
[46] Sajad Shirali-Shahreza,et al. FleXam: flexible sampling extension for monitoring and security applications in openflow , 2013, HotSDN '13.
[47] Franco Zambonelli,et al. A survey of autonomic communications , 2006, TAAS.
[48] Bassem Nasser,et al. A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies , 2005, Electron. Notes Theor. Comput. Sci..
[49] Katarzyna Wac,et al. Assessing the Implications of Cellular Network Performance on Mobile Content Access , 2016, IEEE Transactions on Network and Service Management.
[50] Jan De Clercq,et al. Single Sign-On Architectures , 2002, InfraSec.
[51] Yan Wang,et al. Mobileflow: Toward software-defined mobile networks , 2013, IEEE Communications Magazine.
[52] Tarik Taleb,et al. EASE: EPC as a service to ease mobile core network deployment over cloud , 2015, IEEE Network.
[53] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[54] David W. Chadwick,et al. Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[55] Syed Ali Khayam,et al. Revisiting Traffic Anomaly Detection Using Software Defined Networking , 2011, RAID.
[56] Jose M. Alcaraz Calero,et al. The SELFNET Approach for Autonomic Management in an NFV/SDN Networking Paradigm , 2016, Int. J. Distributed Sens. Networks.
[57] Gail-Joon Ahn,et al. FLOWGUARD: building robust firewalls for software-defined networks , 2014, HotSDN.
[58] Huiqiang Wang,et al. A Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus , 2009, 2009 Third International Conference on Network and System Security.
[59] Torsten Braun,et al. Service level agreements-driven management of distributed applications in cloud computing environments , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[60] Jose M. Alcaraz Calero,et al. Dynamic Reconfiguration in 5G Mobile Networks to Proactively Detect and Mitigate Botnets , 2017, IEEE Internet Computing.
[61] Daniel Massey,et al. G-RCA: A Generic Root Cause Analysis Platform for Service Quality Management in Large IP Networks , 2010, IEEE/ACM Transactions on Networking.
[62] Ahmet Kondoz,et al. Radio Frequency Traffic Classification Over WLAN , 2017, IEEE/ACM Transactions on Networking.
[63] Aiko Pras,et al. Enabling a Mobility Prediction-Aware Follow-Me Cloud Model , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).
[64] Aaron J. Quigley,et al. Model Checking for Autonomic Systems Specified with ASSL , 2009, NASA Formal Methods.
[65] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[66] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.