An overview of security challenges in communication networks
暂无分享,去创建一个
Marjan Gusev | Lena Wosinska | Konstantinos Manousakis | Marija Furdek | José-Luis Marzo | Michal Aibin | Krzysztof Walkowiak | Róza Goscien | Sashko Ristov | M. Gusev | M. Furdek | L. Wosinska | K. Manousakis | J. Marzo | Michal Aibin | S. Ristov | K. Walkowiak | Róża Goścień
[1] J. Koenderink. Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.
[2] F. Richard Yu,et al. Distributed denial of service attacks in software-defined networking with cloud computing , 2015, IEEE Communications Magazine.
[3] Ozan K. Tonguz,et al. Failure location algorithm for transparent optical networks , 2005, IEEE Journal on Selected Areas in Communications.
[4] Biswanath Mukherjee,et al. Minimizing the Risk From Disaster Failures in Optical Backbone Networks , 2014, Journal of Lightwave Technology.
[5] Marília Curado,et al. A Research Agenda for Benchmarking the Resilience of Software Defined Networks , 2014, 2014 IEEE International Symposium on Software Reliability Engineering Workshops.
[6] Mark S. Leeson,et al. Fault and attack management in all-optical networks , 2006, IEEE Communications Magazine.
[7] Biswanath Mukherjee,et al. Network adaptability to disaster disruptions by exploiting degraded-service tolerance , 2014, IEEE Communications Magazine.
[8] Lena Wosinska,et al. Attack-Aware Dedicated Path Protection in Optical Networks , 2016, Journal of Lightwave Technology.
[9] Haralambos Mouratidis,et al. Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts , 2014, Comput. Stand. Interfaces.
[10] Jing Zhu,et al. Attack-Aware Service Provisioning to Enhance Physical-Layer Security in Multi-Domain EONs , 2016, Journal of Lightwave Technology.
[12] Bernhard Plattner,et al. Network anomaly detection in the cloud: The challenges of virtual service migration , 2014, 2014 IEEE International Conference on Communications (ICC).
[13] Ryan Shea,et al. Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis , 2013, IEEE Systems Journal.
[14] Song Guo,et al. Byzantine-Resilient Secure Software-Defined Networks with Multiple Controllers in Cloud , 2014, IEEE Transactions on Cloud Computing.
[15] Muriel Medard,et al. Security issues in all-optical networks , 1997 .
[16] Sherali Zeadally,et al. Critical infrastructure protection: Requirements and challenges for the 21st century , 2015, Int. J. Crit. Infrastructure Prot..
[17] Qi-feng Liu,et al. Electromagnetic pulse threats to electronic information system and corresponding protection measures , 2011 .
[18] Sakir Sezer,et al. Queen ' s University Belfast-Research Portal Are We Ready for SDN ? Implementation Challenges for Software-Defined Networks , 2016 .
[19] Pablo Pavón-Mariño,et al. Wavelength assignment for reducing in-band crosstalk attack propagation in optical networks: ILP formulations and heuristic algorithms , 2012, Eur. J. Oper. Res..
[20] Marija Furdek,et al. Physical-layer attacks in all-optical WDM networks , 2011, 2011 Proceedings of the 34th International Convention MIPRO.
[21] F. Richard Yu,et al. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.
[22] Viren Pereira,et al. EMP (Electro-Magnetic Pulse) weapon technology along with EMP shielding & detection methodology , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[23] Reuven Cohen,et al. Coping with physical attacks on random network structures , 2013, 2014 IEEE International Conference on Communications (ICC).
[24] Reza Curtmola,et al. Mitigating Byzantine Attacks in Ad Hoc Wireless Networks , 2004 .
[25] Lena Wosinska,et al. A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment , 2010, IEEE/ACM Transactions on Networking.
[26] Colin R. Miller. Electromagnetic Pulse Threats in 2010 , 2013 .
[27] Gil Zussman,et al. The resilience of WDM networks to probabilistic geographical failures , 2011, INFOCOM 2011.
[28] A. Takada,et al. Security in Photonic Networks: Threats and Security Enhancement , 2011, Journal of Lightwave Technology.
[29] Joel C. Willemssen. CRITICAL INFRASTRUCTURE PROTECTION Comments on the Proposed Cyber Security Information Act of 2000 Statement of , 2000 .
[30] Basil S. Maglaris,et al. Leveraging SDN for Efficient Anomaly Detection and Mitigation on Legacy Networks , 2014, 2014 Third European Workshop on Software Defined Networks.
[31] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[32] Paul R. Prucnal,et al. Optical Layer Security in Fiber-Optic Networks , 2011, IEEE Transactions on Information Forensics and Security.
[33] Shoba Krishnan,et al. Security Issues in All-Optical Networks , 2011, 2011 Annual SRII Global Conference.