| A survey and classification of controller placement problem in SDN |
11 |
| A survey on blockchain cybersecurity vulnerabilities and possible countermeasures |
9 |
| Enhancing IoT security through network softwarization and virtual security appliances |
7 |
| Blockchain and smart contracts for higher education registry in Brazil |
5 |
| DSSDN: Demand-supply based load balancing in Software-Defined Wide-Area Networks |
5 |
| DDoS protection with stateful software-defined networking |
4 |
| Real-time and fine-grained network monitoring using in-band network telemetry |
3 |
| Secure and efficient verification for data aggregation in wireless sensor networks |
3 |
| A holistic approach to mitigating DoS attacks in SDN networks |
3 |
| Fast and efficient probing of heterogeneous IoT networks |
2 |
| Trust management in cognitive radio networks: A survey |
2 |
| Optimal management of reusable functional blocks in 5G superfluid networks |
2 |
| A flow handover protocol to support state migration in softwarized networks |
2 |
| Orchestrator conversation: Distributed management of cloud applications |
2 |
| Botnet detection based on network flow summary and deep learning |
2 |
| User identification via neural network based language models |
2 |
| A deep learning method to detect network intrusion through flow-based features |
2 |
| A scalable detection and prevention scheme for voice over internet protocol (VoIP) signaling attacks using handler with Bloom filter |
2 |
| Domain-based distributed identifier-locator mapping management in Internet-of-Things networks |
2 |
| ONVisor: Towards a scalable and flexible SDN-based network virtualization platform on ONOS |
1 |
| Automatic data aggregation for recursively modeled NFV services |
1 |
| Smashing OpenFlow's atomic actions: Programmable data plane packet manipulation in hardware |
1 |
| Intent-based service management for heterogeneous software-defined infrastructure domains |
1 |
| Sensitivity analysis of an availability model for disaster tolerant cloud computing system |
1 |
| Clustering-based quality selection heuristics for HTTP adaptive streaming over cache networks |
1 |
| Securing light clients in blockchain with DLCP |
1 |
| A flexible, reliable, and adaptive timeslot-based advance bandwidth-reservation mechanism for media delivery services |
1 |
| Deadline-aware TCP congestion control for HTTP adaptive streaming services |
1 |
| An approach for provisioning virtual sensors in sensor clouds |
1 |
| Highly efficient optical aggregation network with network functions virtualization |
1 |
| Resource availability-aware adaptive provisioning of virtual data center networks |
1 |
| Spectrum mobility management in cognitive two-tier networks |
1 |
| Design, implementation, and performance evaluation of identity-based cryptography in ONOS |
1 |
| NomadiKey: User authentication for smart devices based on nomadic keys |
1 |
| Order@Cloud: An agnostic meta-heuristic for VM provisioning, adaptation, and organisation |
0 |
| Booter list generation: The basis for investigating DDoS-for-hire websites |
0 |
| Rendezvous-based access control for information-centric architectures |
0 |
| The research on a novel structure of two-layer distributed controllers in software-defined networking |
0 |
| Analysis of monitoring and multipath support on top of OpenFlow specification |
0 |
| HeS-CoP: Heuristic switch-controller placement scheme for distributed SDN controllers in data center networks |
0 |
| Formal modeling and verification of software-defined networks: A survey |
0 |
| Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems |
0 |
| A system for profiling the IXPs in a region and monitoring their growth: Spotlight at the internet frontier |
0 |
| Probe generation for active probing |
0 |
| A meta-heuristic Bayesian network classification for intrusion detection |
0 |
| Deep mining port scans from darknet |
0 |
| A bottom-up design for spatial search in large networks and clouds |
0 |
| On the design and performance evaluation of automatic traffic report generation systems with huge data volumes |
0 |
| New fluid approaches for studying the performance of elastic traffic under class based weighed fair queuing system |
0 |
| PlaySharing: A group synchronization scheme for media streaming services in hierarchical WLANs |
0 |