Management and Security in the Age of Hyperconnectivity
暂无分享,去创建一个
[1] Yashar Ganjali,et al. HyperFlow: A Distributed Control Plane for OpenFlow , 2010, INM/WREN.
[2] Josef Langer,et al. Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless , 2013, WOOT.
[3] Amin Vahdat,et al. Hedera: Dynamic Flow Scheduling for Data Center Networks , 2010, NSDI.
[4] Yifei Yuan,et al. NetEgg: Programming Network Policies by Examples , 2014, HotNets.
[5] Raouf Boutaba,et al. PayLess: A low cost network monitoring framework for Software Defined Networks , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).
[6] Mike Bond,et al. 2010 IEEE Symposium on Security and Privacy Chip and PIN is Broken , 2022 .
[7] Anja Feldmann,et al. Logically centralized?: state distribution trade-offs in software defined networks , 2012, HotSDN '12.
[8] Avishai Wool,et al. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[9] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[10] Ramesh Govindan,et al. DREAM: dynamic resource allocation for software-defined measurement , 2015, SIGCOMM 2015.
[11] George Pavlou,et al. Adaptive Resource Management and Control in Software Defined Networks , 2015, IEEE Transactions on Network and Service Management.
[12] Ravishankar K. Iyer,et al. Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges , 2015, CPSS@ASIACSS.
[13] Mabry Tyson,et al. FRESCO: Modular Composable Security Services for Software-Defined Networks , 2013, NDSS.
[14] Ricardo J. Rodríguez,et al. Practical Experiences on NFC Relay Attacks with Android - Virtual Pickpocketing Revisited , 2015, RFIDSec.
[15] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[16] Gerhard P. Hancke,et al. A Practical Relay Attack on ISO 14443 Proximity Cards , 2005 .
[17] Steven J. Murdoch,et al. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication , 2010, Financial Cryptography.
[18] Aiko Pras,et al. Collaborative DDoS defense using flow-based security event information , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[19] Sujata Banerjee,et al. ElasticTree: Saving Energy in Data Center Networks , 2010, NSDI.
[20] A. Neeraja,et al. Licensed under Creative Commons Attribution Cc by Improving Network Management with Software Defined Networking , 2022 .
[21] Young-Bae Ko,et al. Trends and Potentials of the Smart Grid Infrastructure: From ICT Sub-System to SDN-Enabled Smart Grid Architecture , 2015 .
[22] Murali S. Kodialam,et al. Traffic engineering in software defined networks , 2013, 2013 Proceedings IEEE INFOCOM.