|
[1]
|
Sood, K., Karmakar, K.K., Varadharajan, V., et al. (2019) Analysis of Policy-Based Security Management System in Software-Defined Networks. IEEE Communications Letters, 1. [Google Scholar] [CrossRef]
|
|
[2]
|
Montida, P., Ruan, H., Qipeng, S., et al. (2018) NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures. IEEE Communications Surveys & Tutorials, 20, 3330-3368. [Google Scholar] [CrossRef]
|
|
[3]
|
Li, W., Meng, W. and Kwok, L.F. (2016) A Survey on Open Flow-Based Software Defined Networks: Security Challenges and Countermeasures. Journal of Network & Computer Applications, 68, 126-139. [Google Scholar] [CrossRef]
|
|
[4]
|
Bates, A., Butler, K., Haeberlen, A., et al. (2014) Let SDN Be Your Eyes: Secure Forensics in Data Center Networks. The Workshop on Security of Emerging NETWORKING Technologies. [Google Scholar] [CrossRef]
|
|
[5]
|
Yang, L., Ng, B. and Seah, W.K.G. (2016) Heavy Hitter Detection and Identifica-tion in Software Defined Networking. 2016 25th International Conference on Computer Communication and Networks (ICCCN), Waikoloa, 1-4 August 2016, 1-10. [Google Scholar] [CrossRef]
|
|
[6]
|
Tu, R., Wang, X., Zhao, J., et al. (2015) Design of a Load-Balancing Middle Box Based on SDN for Data Centers. 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hong Kong, 26 April-1 May 2015, 480-485. [Google Scholar] [CrossRef]
|
|
[7]
|
Xie, J., Yu, F.R., Huang, T., et al. (2018) A Survey of Machine Learn-ing Techniques Applied to Software Defined Networking (SDN): Research Issues and Challenges. IEEE Communications Surveys & Tutorials, 21, 393-430. [Google Scholar] [CrossRef]
|
|
[8]
|
Edwards, T.G. and Belkin, W. (2014) Using SDN to Facilitate Precisely Timed Actions on real-Time Data Streams. Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, Chica-go, 22 August 2014, 55-60. [Google Scholar] [CrossRef]
|
|
[9]
|
Schwabe, A. and Karl, H. (2014) Using MAC Addresses as Efficient Routing Labels in Data Centers. Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, Chicago, Illinois, 22 Au-gust 2014, 115-120. [Google Scholar] [CrossRef]
|
|
[10]
|
Lin, P.C., Liu, J.C. and Chiou, P.R. (2015) An Event-Based SDN Architecture for Network Security Analysis. 2015 International Carnahan Conference on Security Technology (ICCST), 21-24 September 2015, Taipei, 159-164. [Google Scholar] [CrossRef]
|
|
[11]
|
Chen, T. and Guestrin, C. (2016) XGBoost: A Scalable Tree Boosting System. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining Pages, San Francisco, 13-17 August 2016, 785-794. [Google Scholar] [CrossRef]
|