Automated Orchestration of Security Chains Driven by Process Learning*
暂无分享,去创建一个
Stephan Merz | Rémi Badonnel | Abdelkader Lahmadi | Nicolas Schnepf | Stephan Merz | Abdelkader Lahmadi | Nicolas Schnepf | Rémi Badonnel | A. Lahmadi
[1] Aiko Pras,et al. An Overview of IP Flow-Based Intrusion Detection , 2010, IEEE Communications Surveys & Tutorials.
[2] Minlan Yu,et al. SIMPLE-fying middlebox policy enforcement using SDN , 2013, SIGCOMM.
[3] David Walker,et al. Frenetic: a network programming language , 2011, ICFP.
[4] Dominique Barthel,et al. Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks , 2012, RFC.
[5] Mohamed Cheriet,et al. Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns , 2019, IEEE Transactions on Services Computing.
[6] Stephan Merz,et al. Generation of SDN policies for protecting android environments based on automata learning , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
[7] Brighten Godfrey,et al. VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.
[8] Gaetan Hurel,et al. Behavioral and dynamic security functions chaining for Android devices , 2015, 2015 11th International Conference on Network and Service Management (CNSM).
[9] Yuriy Brun,et al. Synoptic: studying logged behavior with inferred models , 2011, ESEC/FSE '11.
[10] Russell J. Clark,et al. Kinetic: Verifiable Dynamic Network Control , 2015, NSDI.
[11] Ning Kong,et al. HTTP Usage in the Registration Data Access Protocol (RDAP) , 2015, RFC.
[12] Ryan Beckett,et al. Network Control Plane Synthesis and Verification , 2018 .
[13] Nate Foster,et al. Efficient synthesis of network updates , 2014, PLDI.
[14] Hyunwoo Choi,et al. Enabling Automatic Protocol Behavior Analysis for Android Applications , 2016, CoNEXT.
[15] Gail-Joon Ahn,et al. FLOWGUARD: building robust firewalls for software-defined networks , 2014, HotSDN.
[16] Myung-Ki Shin,et al. A Verification Method of SDN Firewall Applications , 2016, IEICE Trans. Commun..
[17] Michael Schapira,et al. VeriCon: towards verifying controller programs in software-defined networks , 2014, PLDI.
[18] Erik Derr,et al. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis , 2016, USENIX Security Symposium.
[19] Ioannis G. Askoxylakis,et al. Reactive security for SDN/NFV‐enabled industrial networks leveraging service function chaining , 2018, Trans. Emerg. Telecommun. Technol..
[20] Marco Roveri,et al. The nuXmv Symbolic Model Checker , 2014, CAV.
[21] M Handley,et al. RFC 4732: Internet Denial-of-Service Considerations , 2006 .
[22] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[23] Olivier Festor,et al. A platform for the analysis and visualization of network flow data of android environments , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[24] Sylvia Ratnasamy,et al. BlindBox: Deep Packet Inspection over Encrypted Traffic , 2015, SIGCOMM.
[25] Nick Feamster,et al. The road to SDN: an intellectual history of programmable networks , 2014, CCRV.
[26] VeriCon: towards verifying controller programs in software-defined networks , 2014, PLDI.
[27] Michalis Faloutsos,et al. ProfileDroid: multi-layer profiling of android applications , 2012, Mobicom '12.
[28] Anna Sperotto,et al. Flow-based intrusion detection , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.
[29] Benoit Claise,et al. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information , 2008, RFC.
[30] Muttukrishnan Rajarajan,et al. Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.
[31] Stephan Merz,et al. Automated Factorization of Security Chains in Software-Defined Networks , 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[32] Gary Scott Malkin,et al. Internet Users' Glossary , 1996, RFC.
[33] Nicolas Schnepf,et al. Orchestration et vérification de fonctions de sécurité pour des environnements intelligents. (Orchestration and verification of security functions for smart devices) , 2019 .
[34] Yuriy Brun,et al. Using Declarative Specification to Improve the Understanding, Extensibility, and Comparison of Model-Inference Algorithms , 2015, IEEE Transactions on Software Engineering.
[35] Gaetan Hurel,et al. Towards cloud-based compositions of security functions for mobile devices , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[36] Stephan Merz,et al. Automated verification of security chains in software-defined networks with synaptic , 2017, 2017 IEEE Conference on Network Softwarization (NetSoft).
[37] Jerome A. Feldman,et al. On the Synthesis of Finite-State Machines from Samples of Their Behavior , 1972, IEEE Transactions on Computers.
[38] Mark Handley,et al. Internet Denial-of-Service Considerations , 2006, RFC.