Nothing Special   »   [go: up one dir, main page]

Skip to main content

Empirical Evidences in Software-Defined Network Security: A Systematic Literature Review

  • Chapter
  • First Online:
Information Fusion for Cyber-Security Analytics

Part of the book series: Studies in Computational Intelligence ((SCI,volume 691))

  • 1982 Accesses

Abstract

Nowadays, the term software-defined networking (SDN) becomes very popular. It is an approach that decouples the “control plane” and the “data plane” in switches to allow more programmable control of network traffic flows. Currently, several efforts are under way to thoroughly study and deploy SDN, as well as create standards that regulate the use of SDN. Since SDN is considered relatively a new discipline, a very little empirical literature has been aggregated in this field. The objective of this study is to aggregate and synthesize the empirical evidence from literature of SDN security to report the trends, patterns, and current status of the field. A systematic literature review (SLR) has been conducted to synthesize the empirical work in SDN.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hu, H., Han, W., Ahn, G.-J., Zhao, Z.: FLOWGUARD: building robust firewalls for software-defined networks. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  2. Hu, C., Liu, B., Zhao, H., Chen, K., Chen, Y., Yu, C., Hao, W.: Discount counting for fast flow statistics on flow size and flow volume. IEEE/ACM Trans. Networking 22(3), 970–981 (2014)

    Article  Google Scholar 

  3. Kreutz, D., Ramos, F.M.V., Verissimo, P.: Towards secure and dependable software-defined networks. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  4. Scott-Hayward, S., O’Callaghan, G., Sezer, S.: SDN security: a survey in 2013 I.E. SDN for future networks and services (SDN4FNS), pp. 1–7. Institute of Electrical and Electronics Engineers (IEEE) (2013)

    Google Scholar 

  5. Kloeti, R., Kotronis, V., Smith, P.: OpenFlow: a security analysis. In: Proceedings of the 8th Workshop on Secure Network Protocols (NPSec), part of IEEE ICNP, Göttingen, Germany, October 2013

    Google Scholar 

  6. Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, ACM, 2013, pp. 55–60, HotSDN’13, 16 August 2013, Hong Kong, China

    Google Scholar 

  7. Kreutz, D., Ramos, F.M.V., Verissimo, P., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey, June 2014

    Google Scholar 

  8. Hu, F., Hao, Q., Bao, K.: A survey on software-defined network (SDN) and OpenFlow: from concept to implementation. IEEE Commun. Surv. Tutor. 16(4), 2181–2206 (2014)

    Article  Google Scholar 

  9. Nunes, B., Mendonca, M., Nguyen, X.-N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, future of programmable networks. IEEE Commun. Surv. Tutor. 16(3), 1617–1634 (2014)

    Article  Google Scholar 

  10. Xia, W., Wen, Y., Foh, C.H., Niyato, D., Xie, H.: A survey on software-defined networking. IEEE Commun. Surv. Tutor. 99, 1 (2014)

    Google Scholar 

  11. Jarraya, Y., Madi, T., Debbabi, M.: A survey and a layered taxonomy of software-defined networking. IEEE Commun. Surv. Tutor. 16(1), 1955–1980 (2014)

    Article  Google Scholar 

  12. Lara, A., Kolasani, A., Ramamurthy, B.: Network innovation using OpenFlow: a survey. IEEE Commun. Surv. Tutor. 16(1), 493–512 (2014)

    Article  Google Scholar 

  13. Lara, A., Ramamurthy, B., Nagaraja, K., Krishnamoorthy, A., Raychaudhuri, D.: Using OpenFlow to provide cut-through switching in MobilityFirst. Photonic Netw. Commun. 28(2), 165–177 (2014). doi:10.1007/s11107-014-0461-3. http://link.springer.com/article/10.1007/s11107-014-0461-3

    Article  Google Scholar 

  14. Feamster, N., Rexford, J., Zegura, E.: The road to SDN. Queue 11(12), 20–32 (2013)

    Article  Google Scholar 

  15. Feamster, N., Rexford, J., Zegura, E.: The road to SDN: an intellectual history of programmable networks. ACM Queue 11, 12 (2013)

    Article  Google Scholar 

  16. Li, H., Hu, C., Hong, J., Chen, X., Jiang, Y.: Parsing application layer protocol with commodity hardware for SDN. In: ANCS ’15: Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for Networking and Communications Systems, May 2015

    Google Scholar 

  17. Qu, Y.R., Zhang, H.H., Zhou, S., Prasanna, V.K.: Optimizing many-field packet classification on FPGA, multi-core general purpose processor, and GPU. In: ANCS ’15: Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for Networking and Communications Systems, May 2015

    Google Scholar 

  18. Garzarella, S., Lettieri, G., Rizzo, L.: Virtual device pass through for high speed VM networking. In: ANCS ’15: Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for Networking and Communications Systems, May 2015

    Google Scholar 

  19. Hsieh, C.-L., Weng, N.: Scalable many-field packet classification using multidimensional-cutting via selective bit-concatenation. In: ANCS ’15: Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for Networking and Communications Systems, May 2015

    Google Scholar 

  20. Silva, A.: A short introduction to the coalgebraic method. SIGLOG News. 2(2) (April 2015)

    Google Scholar 

  21. Chetty, M., Kim, H., Sundaresan, S., Burnett, S., Feamster, N., Keith Edwards, W.: uCap: an internet data management tool for the home. In: CHI ’15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, April 2015

    Google Scholar 

  22. Verma, A., Pedrosa, L., Korupolu, M., Oppenheimer, D., Tune, E., Wilkes, J.: Large-scale cluster management at Google with Borg. In: EuroSys ’15: Proceedings of the Tenth European Conference on Computer Systems, April 2015

    Google Scholar 

  23. Tobias Distler, Christopher Bahn, Alysson Bessani, Frank Fischer, Flavio Junqueira. Extensible distributed coordination. April 2015 EuroSys ’15: Proceedings of the Tenth European Conference on Computer Systems

    Google Scholar 

  24. Leners, J.B., Gupta, T., Aguilera, M.K., Walfish, M.: Taming uncertainty in distributed systems with help from the network. In: EuroSys ’15: Proceedings of the Tenth European Conference on Computer Systems, April 2015

    Google Scholar 

  25. Ambrosin, M., Conti, M., De Gaspari, F., Poovendran, R.: LineSwitch: efficiently managing switch flow in software-defined networking while effectively tackling DoS attacks. In: ASIA CCS ’15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, April 2015

    Google Scholar 

  26. Dong, X., Lin, H., Tan, R., Iyer, R.K., Kalbarczyk, Z.: Software-defined networking for smart grid resilience: opportunities and challenges. In: CPSS ’15: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, April 2015

    Google Scholar 

  27. Ma, J., Sui, X., Sun, N., Li, Y., Yu, Z., Huang, B., Xu, T., Yao, Z., Chen, Y., Wang, H., Zhang, L., Bao, Y.: Supporting differentiated services in computers via programmable architecture for resourcing-on-demand (PARD). In: ASPLOS ’15: Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, March 2015

    Google Scholar 

  28. Rehman, M.S., Boles, J., Hammoud, M., Sakr, M.F.: A cloud computing course: from systems to services. In: SIGCSE ’15: Proceedings of the 46th ACM Technical Symposium on Computer Science Education, February 2015

    Google Scholar 

  29. Kangarlou, A., Shete, S., Strunk, J.D.: Chronicle: capture and analysis of NFS workloads at line rate. In: FAST’15: Proceedings of the 13th USENIX Conference on File and Storage Technologies, February 2015

    Google Scholar 

  30. Chockler, G., Junqueira, F., Rodrigues, R., Vigfusson, Y.: LADIS’14: 8th Workshop on Large-Scale Distributed Systems and Middleware. SIGOPS Operating Systems Review, vol. 49, issue 1, January 2015

    Google Scholar 

  31. Chlipala, A.: From network interface to multithreaded web applications: a case study in modular program verification. In: POPL ’15: Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 2015

    Google Scholar 

  32. Foster, N., Kozen, D., Milano, M., Silva, A., Thompson, L.: A coalgebraic decision procedure for NetKAT. In: POPL ’15: Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 2015

    Google Scholar 

  33. Alt, L., Beverly, R., Dainotti, A.: Uncovering network tarpits with degreaser. In: CSAC ’14: Proceedings of the 30th Annual Computer Security Applications Conference, December 2014

    Google Scholar 

  34. Spillner, J., Schill, A.: Algorithms for dispersed processing. In: UCC ’14: Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, December 2014

    Google Scholar 

  35. Bleikertz, S., Vogel, C., Groß, T.: Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures. In: ACSAC ’14: Proceedings of the 30th Annual Computer Security Applications Conference, December 2014

    Google Scholar 

  36. Renner, T., Stanik, A., Körner, M., Kao, O.: Portable SDN applications on the PaaS layer. In: UCC ’14: Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, December 2014

    Google Scholar 

  37. de Jesus, W.P., da Silva, D.A., de Sousa Júnior, R.T., da Frota, F.V.L.: Analysis of SDN contributions for cloud computing security. In: UCC ’14: Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, December 2014

    Google Scholar 

  38. Soulé, R., Basu, S., Marandi, P.J., Pedone, F., Kleinberg, R., Sirer, E.G., Foster, N.: Merlin: a language for provisioning network resources. In: CoNEXT ’14: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, December 2014

    Google Scholar 

  39. Kuzniar, M., Peresini, P., Kostić, D.: Providing reliable FIB update acknowledgments in SDN. In: CoNEXT ’14: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, December 2014

    Google Scholar 

  40. Abaid, Z., Rezvani, M., Jha, S.: MalwareMonitor: an SDN-based framework for securing large networks. In: CoNEXT Student Workshop ’14: Proceedings of the 2014 CoNEXT on Student Workshop, December 2014

    Google Scholar 

  41. Moradi, M., Wu, W., Li, L.E., Mao, Z.M.: SoftMoW: recursive and reconfigurable cellular WAN architecture. In: CoNEXT ’14: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, December 2014

    Google Scholar 

  42. Durairajan, R., Sommers, J., Barford, P.: Controller-agnostic SDN debugging. In: CoNEXT ’14: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, December 2014

    Google Scholar 

  43. Castro, I., Cardona, J.C., Gorinsky, S., Francois, P.: Remote peering: more peering without internet flattening. In: CoNEXT ’14: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, December 2014

    Google Scholar 

  44. Wang, A., Guo, Y., Hao, F., Lakshman, T.V., Chen, S.: Scotch: elastically scaling up SDN control-plane using vSwitch based overlay. In: CoNEXT ’14: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, December 2014

    Google Scholar 

  45. Klingel, D., Khondoker, R., Marx, R., Bayarou, K.: Security analysis of software defined networking architectures: PCE, 4D and SANE. In: AINTEC ’14: Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference, November 2014

    Google Scholar 

  46. Tasch, M., Khondoker, R., Marx, R., Bayarou, K.: Security analysis of security applications for software defined networks. In: AINTEC ’14: Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference, November 2014

    Google Scholar 

  47. Mayer, S., Hassan, Y.N., Sörös, G.: A magic lens for revealing device interactions in smart environments. In: SA ’14: SIGGRAPH Asia 2014 Mobile Graphics and Interactive Applications, November 2014

    Google Scholar 

  48. Muhamedyev, R.I., Kalimoldaev, M.N., Uskenbayeva, R.K.: Semantic network of ICT domains and applications. In: EGOSE ’14: Proceedings of the 2014 Conference on Electronic Governance and Open Society: Challenges in Eurasia, November 2014

    Google Scholar 

  49. Toso, G., Munaretto, D., Conti, M., Zorzi, M.: Attack resilient underwater networks through software defined networking. In: WUWNET ’14: Proceedings of the International Conference on Underwater Networks & Systems, November 2014

    Google Scholar 

  50. McDaniel, P., Jaeger, T., La Porta, T.F., Papernot, N., Walls, R.J., Kott, A., Marvel, L., Swami, A., Mohapatra, P., Krishnamurthy, S.V., Neamtiu, I.: Security and science of agility. In: MTD ’14: Proceedings of the First ACM Workshop on Moving Target Defense, November 2014

    Google Scholar 

  51. Jafarian, J.H.H., Al-Shaer, E., Duan, Q.: Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers. In: MTD ’14: Proceedings of the First AM Workshop on Moving Target Defense, November 2014

    Google Scholar 

  52. Cuzzocrea, A., Song, I.-Y.: Big graph analytics: the state of the art and future research agenda. In: DOLAP ’14: Proceedings of the 17th International Workshop on Data Warehousing and OLAP, November 2014

    Google Scholar 

  53. Sommer, R., Vallentin, M., De Carli, L., Paxson, V.: HILTI: an abstract execution environment for deep, stateful network traffic analysis. In: IMC ’14: Proceedings of the 2014 Conference on Internet Measurement Conference, November 2014

    Google Scholar 

  54. Richter, P., Smaragdakis, G., Feldmann, A., Chatzis, N., Boettger, J., Willinger, W.: Peering at peerings: on the role of IXP route servers. In: IMC ’14: Proceedings of the 2014 Conference on Internet Measurement Conference, November 2014

    Google Scholar 

  55. Pujol, E., Richter, P., Chandrasekaran, B., Smaragdakis, G., Feldmann, A., Maggs, B.M., Ng, K.-C.: Back-office web traffic on the internet. In: IMC ’14: Proceedings of the 2014 Conference on Internet Measurement Conference, November 2014

    Google Scholar 

  56. Butt, S., Ganapathy, V., Srivastava, A.: On the control plane of a self-service cloud platform. In: SOCC ’14: Proceedings of the ACM Symposium on Cloud Computing, November 2014

    Google Scholar 

  57. Shin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., Yegneswaran, V., Noh, J., Kang, B.B.: Rosemary: a robust, secure, and high-performance network operating system. In: CCS ’14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, November 2014

    Google Scholar 

  58. Yuan, Y., Alur, R., Loo, B.T.: NetEgg: programming network policies by examples. In: HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks, October 2014

    Google Scholar 

  59. Vissicchio, S., Vanbever, L., Rexford, J.: Sweet little lies: fake topologies for flexible routing. In: HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks, October 2014

    Google Scholar 

  60. Chandrasekaran, B., Benson, T.: Tolerating SDN application failures with LegoSDN. In: HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks, October 2014

    Google Scholar 

  61. Ludwig, A., Rost, M., Foucard, D., Schmid, S.: Good network updates for bad packets: waypoint enforcement beyond destination-based routing policies. In: HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks, October 2014

    Google Scholar 

  62. Donovan, S., Feamster, N.: Intentional network monitoring: finding the needle without capturing the haystack. In: HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks, October 2014

    Google Scholar 

  63. Schlinker, B., Zarifis, K., Cunha, I., Feamster, N., Katz-Bassett, E.: PEERING: an AS for Us. In: HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks, October 2014

    Google Scholar 

  64. Majumdar, R., Tetali, S.D., Wang, Z.: Kuai: a model checker for software-defined networks. In: FMCAD ’14: Proceedings of the 14th Conference on Formal Methods in Computer-Aided Design, October 2014

    Google Scholar 

  65. Bonelli, N., Giordano, S., Procissi, G., Abeni, L.: A purely functional approach to packet processing. In: ANCS ’14: Proceedings of the tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, October 2014

    Google Scholar 

  66. Kaplan, M., Zheng, C., Monaco, M., Keller, E., Sicker, D.: WASP: a software-defined communication layer for hybrid wireless networks. In: ANCS ’14: Proceedings of the tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, October 2014

    Google Scholar 

  67. Kotani, D., Okabe, Y.: A packet-in message filtering mechanism for protection of control plane in openflow networks. In: ANCS ’14: Proceedings of the tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, October 2014

    Google Scholar 

  68. Arumaithurai, M., Chen, J., Monticelli, E., Fu, X., Ramakrishnan, K.K.: Exploiting ICN for flexible management of software-defined networks. In: INC ’14: Proceedings of the 1st International Conference on Information-Centric Networking, September 2014

    Google Scholar 

  69. Casado, M., Foster, N., Guha, A.: Abstractions for software-defined networks. Commun. ACM 57(10), 86–95 (2014)

    Article  Google Scholar 

  70. Sapio, A., Liao, Y., Baldi, M., Ranjan, G., Risso, F., Tongaonkar, A., Torres, R., Nucci, A.: Per-user policy enforcement on mobile apps through network functions virtualization. In: MobiArch ’14: Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture, September 2014

    Google Scholar 

  71. Kuo, Y.-S., Pannuto, P., Dutta, P.: System architecture directions for a software-defined lighting infrastructure. In: VLCS ’14: Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, September 2014

    Google Scholar 

  72. Juhola, A., Ahola, T., Ahola, K.: Adaptive risk management with ontology linked evidential statistics and SDN. In: ECSAW ’14: Proceedings of the 2014 European Conference on Software Architecture Workshops, August 2014

    Google Scholar 

  73. Casey, C.J., Sutton, A., Sprintson, A.: tinyNBI: distilling an API from essential OpenFlow abstractions. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  74. Chandrasekaran, B., Benson, T.: Tolerating SDN application failures with LegoSDN. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  75. Durairajan, R., Sommers, J., Barford, P.: OFf: bug spray for openflow. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  76. Matsumoto, S., Hitz, S., Perrig, A.: Fleet: defending SDNs from malicious administrators. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  77. Ghorbani, S., Godfrey, B.: Towards correct network virtualization. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  78. Jagadeesan, N.A., Pal, R., Nadikuditi, K., Huang, Y., Shi, E., Yu, M.: A secure computation framework for SDNs. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  79. Hand, R., Keller, E.: Closed flow: openflow-like control over proprietary devices. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  80. Agarwal, K., Dixon, C., Rozner, E., Carter, J.: Shadow MACs: scalable label-switching for commodity Ethernet. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  81. Heinonen, J., Partti, T., Kallio, M., Lappalainen, K., Flinck, H., Hillo, J.: Dynamic tunnel switching for SDN-based cellular core networks. In: AllThingsCellular ’14: Proceedings of the 4th Workshop on All things Cellular: Operations, Applications, & Challenges, August 2014

    Google Scholar 

  82. Edwards, T.G., Belkin, W.: Using SDN to facilitate precisely timed actions on real-time data streams. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  83. Fayaz, S.K., Sekar, V.: Testing stateful and dynamic data plans with Flow Test. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  84. Jamjoom, H., Williams, D., Sharma, U.: Don’t call them middleboxes, call them middlepipes. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  85. Berde, P., Gerola, M., Hart, J., Higuchi, Y., Kobayashi, M., Koide, T., Lantz, B., O’Connor, B., Radoslavov, P., Snow, W., Parulkar, G.: ONOS: towards an open, distributed SDN OS. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  86. Bailey, J., Pemberton, D., Linton, A., Pelsser, C., Bush, R.: Enforcing RPKI-based routing policy on the data plane at an internet exchange. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  87. Baldin, I., Huang, S., Gopidi, R.: A resource delegation framework for software defined networks. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  88. Klaedtke, F., Karame, G.O., Bifulco, R., Cui, H.: Access control for SDN controllers. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  89. Mekky, H., Hao, F., Mukherjee, S., Zhang, Z.-L., Lakshman, T.V.: Application-aware data plane processing in SDN. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  90. Nagaraj, K., Katti, S.: ProCel: smart traffic handling for a scalable software EPC. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014

    Google Scholar 

  91. Schlesinger, C., Greenberg, M., Walker, D.: Concurrent NetCore: from policies to pipelines. In: ICFP ’14: Proceedings of the 19th ACM SIGPLAN International Conference on Functional Programming, August 2014

    Google Scholar 

  92. Parniewicz, D., Doriguzzi Corin, R., Ogrodowczyk, L., Rashidi Fard, M., Matias, J., Gerola, M., Fuentes, V., Toseef, U., Zaalouk, A., Belter, B., Jacob, E., Pentikousis, K.: Design and implementation of an OpenFlow hardware abstraction layer. In: DCC ’14: Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, August 2014

    Google Scholar 

  93. Shanmugam, P.K., Subramanyam, N.D., Breen, J., Roach, C., Van der Merwe, J.: DEIDtect: towards distributed elastic intrusion detection. In: DCC ’14: Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, August 2014

    Google Scholar 

  94. Cao, Z., Kodialam, M., Lakshma, T.V.: Traffic steering in software defined networks: planning and online routing. In: DCC ’14: Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, August 2014

    Google Scholar 

  95. Shirali-Shahreza, S., Ganjali, Y.: Traffic statistics collection with FleXam. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014

    Google Scholar 

  96. Alwabel, A., Yu, M., Zhang, Y., Mirkovic, J.: SENSS: observe and control your own traffic in the internet. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014

    Google Scholar 

  97. Rasley, J., Stephens, B., Dixon, C., Rozner, E., Felter, W., Agarwal, K., Carter, J., Fonseca, R.: Planck: millisecond-scale monitoring and control for commodity networks. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014

    Google Scholar 

  98. Sun, P., Mahajan, R., Rexford, J., Yuan, L., Zhang, M., Arefin, A.: A network-state management service. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014

    Google Scholar 

  99. Gupta, A., Vanbever, L., Shahbaz, M., Donovan, S.P., Schlinker, B., Feamster, N., Rexford, J., Shenker, S., Clark, R., Katz-Bassett, E.: SDX: a software defined internet exchange. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014

    Google Scholar 

  100. Alizadeh, M., Edsall, T., Dharmapurikar, S., Vaidyanathan, R., Chu, K., Fingerhut, A., Lam, V.T., Matus, F., Pan, R., Yadav, N., Varghese, G.: CONGA: distributed congestion-aware load balancing for datacenters. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014

    Google Scholar 

  101. Li, J., Berg, S., Zhang, M., Reiher, P., Wei, T.: Drawbridge: software-defined DDoS-resistant traffic engineering. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014

    Google Scholar 

  102. Gember-Jacobson, A., Viswanathan, R., Prakash, C., Grandl, R., Khalid, J., Das, S., Akella, A.: OpenNF: enabling innovation in network function control. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014

    Google Scholar 

  103. Miao, R., Yu, M., Jain, N.: NIMBUS: cloud-scale attack detection and mitigation. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014

    Google Scholar 

  104. Donovan, S., Feamster, N.: NetAssay: providing new monitoring primitives for network operators. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014

    Google Scholar 

  105. Ma, L., He, T., Leung, K.K., Swami, A., Towsley, D.: Inferring link metrics from end-to-end path measurements: identifiability and monitor placement. IEEE/ACM Trans. Networking 22(4), 1351–1368 (2014)

    Article  Google Scholar 

  106. Burgess, M.: Promise theory—what is it? Linux J. 2014(244) (2014)

    Google Scholar 

  107. Wolf, T., Griffioen, J., Calvert, K.L., Dutta, R., Rouskas, G.N., Baldin, I., Nagurney, A.: ChoiceNet: toward an economy plane for the internet. SIGCOMMComput. Commun. Rev. 44(3), 58–65 (2014)

    Article  Google Scholar 

  108. Khan, K.R., Ahmed, Z., Ahmed, S., Syed, A., Khayam, S.A.: Rapid and scalable isp service delivery through a programmable middlebox. SIGCOMM Comput. Commun. Rev. 44(3), 31–37 (2014)

    Article  Google Scholar 

  109. DeBruhl, B., Kroer, C., Datta, A., Sandholm, T., Tague, P.: Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming. In: WiSec ’14: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, July 2014

    Google Scholar 

  110. Neeman, H., Akin, D., Alexander, J., Brunson, D., Calhoun, S.P., Deaton, J., Fotou, F.F., George, B., Gentis, D., Gray, Z., Huebsch, E., Louthan, G., Runion, M., Snow, J., Zimmerman, B.: The OneOklahoma friction free network: towards a multi-institutional science DMZ in an EPSCoR State. In: XSEDE ’14: Proceedings of the 2014 Annual Conference on Extreme Science and Engineering Discovery Environment, July 2014

    Google Scholar 

  111. Tantar, A.-A., Tantar, E.: A survey on sustainability in ICT: a computing perspective. In: GECCO Comp ’14: Proceedings of the 2014 Conference Companion on Genetic and Evolutionary Computation Companion, July 2014

    Google Scholar 

  112. Fontes, R.R., Oliveira, A.L.C., Sampaio, P.N.M., Pinheiro, T.R., Figueira, R.A.R.B.: Authoring of OpenFlow networks with visual network description (SDN version) (WIP). In: SummerSim ’14: Proceedings of the 2014 Summer Simulation Multiconference, July 2014

    Google Scholar 

  113. Yu, Z., Li, M., Liu, Y., Li, X.: GatorCloud: a fine-grained and dynamic resource sharing architecture for multiple cloud services. In: BigSystem ’14: Proceedings of the 2014 ACM International Workshop on Software-Defined Ecosystems, June 2014

    Google Scholar 

  114. Moody, W.C., Anderson, J., Wange, K.-C., Apon, A.: Reconfigurable network testbed for evaluation of datacenter topologies. In: DIDC ’14: Proceedings of the Sixth International Workshop on Data Intensive Distributed Computing, June 2014

    Google Scholar 

  115. Farhadi, H., Du, P., Nakao, A.: User-defined actions for SDN. In: CFI ’14: Proceedings of the Ninth International Conference on Future Internet Technologies, June 2014

    Google Scholar 

  116. Naik, M.: Large-scale configurable static analysis. In: SOAP ’14: Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis, June 2014

    Google Scholar 

  117. Lee, J., Uddin, M., Tourrilhes, J., Sen, S., Banerjee, S., Arndt, M., Kim, K.-H., Nadeem, T.: meSDN: mobile extension of SDN. In: MCS ’14: Proceedings of the Fifth International Workshop on Mobile Cloud Computing & Services, June 2014

    Google Scholar 

  118. Crowley, P.: Author retrospective for characterizing processor architectures for programmable network interfaces. In: International Conference on Supercomputing 25th Anniversary Volume, June 2014

    Google Scholar 

  119. Ball, T., Bjørner, N., Gember, A., Itzhaky, S., Karbyshev, A., Sagiv, M., Schapira, M., Valadarsky, A.: VeriCon: towards verifying controller programs in software-defined networks. In: PLDI ’14: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, June 2014

    Google Scholar 

  120. Vadrevu, C.S.K., Wang, R., Tornatore, M., Martel, C.U., Mukherjee, B.: Degraded service provisioning in mixed-line-rate WDM backbone networks using multipath routing. IEEE/ACM Trans. Networking 22(3), 840–849 (2014)

    Article  Google Scholar 

  121. Vishnoi, A., Poddar, R., Mann, V., Bhattacharya, S.: Effective switch memory management in OpenFlow networks. In: DEBS ’14: Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, May 2014

    Google Scholar 

  122. Jusko, J., Rehak, M., Pevny, T.: A memory efficient privacy preserving representation of connection graphs. In: ACySE ’14: Proceedings of the 1st International Workshop on Agents and CyberSecurity, May 2014

    Google Scholar 

  123. Vissicchio, S., Vanbever, L., Bonaventure, O.: Opportunities and research challenges of hybrid software defined networks. SIGCOMM Comput. Commun. Rev. 44(2), 70–75 (2014)

    Article  Google Scholar 

  124. Bianchi, G., Bonola, M., Capone, A., Cascone, C.: OpenState: programming platform-independent stateful openflow applications inside the switch. SIGCOMM Comput. Commun. Rev. 44(2), 44–51 (2014)

    Article  Google Scholar 

  125. Han, Y., Lu, W., Xu, S.: Characterizing the power of moving target defense via cyber epidemic dynamics. In: HotSoS ’14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, April 2014

    Google Scholar 

  126. Feamster, N., Rexford, J., Zegura, E.: The road to SDN: an intellectual history of programmable networks. SIGCOMM Comput. Commun. Rev. 44(2), 87–98 (2014)

    Article  Google Scholar 

  127. Handigol, N., Heller, B., Jeyakumar, V., Mazières, D., McKeown, N.: I know what your packet did last hop: using packet histories to troubleshoot networks. In: NSDI’14: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, April 2014

    Google Scholar 

  128. Koponen, T., Amidon, K., Balland, P., Casado, M., Chanda, A., Fulton, B., Ganichev, I., Gross, J., Gude, N., Ingram, P., Jackson, E., Lambeth, A., Lenglet, R., Li, S.-H., Padmanabhan, A., Pettit, J., Pfaff, B., Ramanathan, R., Shenker, S., Shieh, A., Stribling, J., Thakkar, P., Wendlandt, D., Yip, A., Zhang, R.: Network virtualization in multi-tenant datacenters. In: NSDI’14: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, April 2014

    Google Scholar 

  129. Nelson, T., Ferguson, A.D., Scheer, M.J.G., Krishnamurthi, S.: Tierless programming and reasoning for software-defined networks. In: NSDI’14: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, April 2014

    Google Scholar 

  130. Hwang, J., Ramakrishnan, K.K., Wood, T.: NetVM: high performance and flexible networking using virtualization on commodity platforms. In: NSDI’14: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, April 2014

    Google Scholar 

  131. Khan, F., Hosein, N., Ghiasi, S., Chuah, C.-N., Sharma, P.: Streaming solutions for fine-grained network traffic measurements and analysis. IEEE/ACM Trans. Networking 22(2), 377–390 (2014)

    Article  Google Scholar 

  132. Zeng, H., Kazemian, P., Varghese, G., McKeown, N.: Automatic test packet generation. IEEE/ACM Trans. Networking 22(2), 554–566 (2014)

    Article  Google Scholar 

  133. Mushi, M., Dutta, R.: Data-driven study of network administration in the evolving landscape of software defined networking. In: HCBDR ’14: Proceedings of the 2014 Workshop on Human Centered Big Data Research, April 2014

    Google Scholar 

  134. Gomes, R.L., Bittencourt, L.F., Madeira, E.R.M.: A similarity model for virtual networks negotiation. In: SAC ’14: Proceedings of the 29th Annual ACM Symposium on Applied Computing, March 2014

    Google Scholar 

  135. Bumgardner, V.K.C., Marek, V.W.: Scalable hybrid stream and hadoop network analysis system. In: ICPE ’14: Proceedings of the 5th ACM/SPEC International Conference on Performance Engineering, March 2014

    Google Scholar 

  136. Stecklina, J.: Shrinking the hypervisor one subsystem at a time: a userspace packet switch for virtual machines. In: VEE ’14: Proceedings of the 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, March 2014

    Google Scholar 

  137. Anderson, C.J., Foster, N., Guha, A., Jeannin, J.-B., Kozen, D., Schlesinger, C., Walker, D.: NetKAT: semantic foundations for networks. In: POPL ’14: Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 2014

    Google Scholar 

  138. Haw, R., Hong, C.S., Lee, S.: An efficient content delivery framework for SDN based LTE network. In: ICUIMC ’14: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, January 2014

    Google Scholar 

  139. Li, X., Freedman, M.J.: Scaling IP multicast on datacenter topologies. In: CoNEXT ’13: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, December 2013

    Google Scholar 

  140. Lee, S.B., Kang, M.S., Gligor, V.D.: CoDef: collaborative defense against large-scale link-flooding attacks. In: CoNEXT ’13: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, December 2013

    Google Scholar 

  141. Jin, X., Li, L.E., Vanbever, L., Rexford, J.: SoftCell: scalable and flexible cellular core network architecture. In: CoNEXT ’13: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, December 2013

    Google Scholar 

  142. Mysore, R.N., Porter, G., Vahdat, A.: FasTrak: enabling express lanes in multi-tenant data centers. In: CoNEXT ’13: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, December 2013

    Google Scholar 

  143. Sun, X., Xie, G.G.: Minimizing network complexity through integrated top-down design. In: CoNEXT ’13: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, December 2013

    Google Scholar 

  144. Lu, H., Arora, N., Zhang, H., Lumezanu, C., Rhee, J., Jiang, G.: HybNET: network manager for a hybrid network infrastructure. In: Middleware Industry ’13: Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX International Middleware Conference, December 2013

    Google Scholar 

  145. Hand, R., Ton, M., Keller, E.: Active security. In: HotNets-XII: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, November 2013

    Google Scholar 

  146. Monaco, M., Michel, O., Keller, E.: Applying operating system principles to SDN controller design. In: HotNets-XII: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, November 2013

    Google Scholar 

  147. Sivaraman, A., Winstein, K., Subramanian, S., Balakrishnan, H.: No silver bullet: extending SDN to the data plane. In: HotNets-XII: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, November 2013

    Google Scholar 

  148. Soulé, R., Basu, S., Kleinberg, R., Sirer, E.G., Foster, N.: Managing the network with Merlin. In: HotNets-XII: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, November 2013

    Google Scholar 

  149. Mogul, J.C., AuYoung, A., Banerjee, S., Popa, L., Lee, J., Mudigonda, J., Sharma, P., Turner, Y.: Corybantic: towards the modular composition of SDN control programs. In: HotNets-XII: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, November 2013

    Google Scholar 

  150. Levine, D., Katti, S., Oran D.: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks. In: HotNets-XII: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, November 2013

    Google Scholar 

  151. Dart, E., Rotman, L., Tierney, B., Hester, M., Zurawski, J.: The Science DMZ: a network design pattern for data-intensive science. In: SC ’13: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, November 2013

    Google Scholar 

  152. Shin, S., Yegneswaran, V., Porras, P., Gu, G.: AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. In: CCS ’13: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, November 2013

    Google Scholar 

  153. Chatzis, N., Smaragdakis, G., Feldmann, A., Willinger, W.: There is more to IXPs than meets the eye. SIGCOMM Comput. Commun. Rev. 43(5), 19–28 (2013)

    Article  Google Scholar 

  154. Crowcroft, J., Fidler, M., Nahrstedt, K., Steinmetz, R.: Is SDN the de-constraining constraint of the future internet? SIGCOMM Comput. Commun. Rev. 43(5), 13–18 (2013)

    Article  Google Scholar 

  155. TalebiFard, P., Nicanfar, H., Hu, X., Leung, V.C.M.: Semantic based networking of information in vehicular clouds based on dimensionality reduction. In: DIVANet ’13: Proceedings of the Third ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, November 2013

    Google Scholar 

  156. Thereska, E., Ballani, H., O’Shea, G., Karagiannis, T., Rowstron, A., Talpey, T., Black, R., Zhu, T.: IOFlow: a software-defined storage architecture. In: SOSP ’13: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, November 2013

    Google Scholar 

  157. Fitfield, T.: Introduction to OpenStack. Linux J. 2013(235) (2013)

    Google Scholar 

  158. Ma, L., He, T., Leung, K.K., Swami, A., Towsley, D.: Identifiability of link metrics based on end-to-end path measurements. In: IMC ’13: Proceedings of the 2013 Conference on Internet Measurement Conference, October 2013

    Google Scholar 

  159. Buddhikot, M.M.: Towards a virtual cellular network with variable grade spectrum: challenges and opportunities. In: MobiCom ’13: Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, September 2013

    Google Scholar 

  160. Fund, F., Korakis, T., Panwar, S.S.: Implementation of a protocol for cooperative packet recovery over hybrid networks. In: WiNTECH ’13: Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization, September 2013

    Google Scholar 

  161. Kirkpatrick, K.: Software-defined networking. Commun. ACM 56(9), 16–19 (2013)

    Article  Google Scholar 

  162. Fayazbakhsh, S.K., Sekar, V., Yu, M., Mogul, J.C.: FlowTags: enforcing network-wide policies in the presence of dynamic middlebox actions. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  163. Antonenko, V., Smelyanskiy, R.: Global network modelling based on mininet approach. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  164. Shirali-Shahreza, S., Ganjali, Y.: FleXam: flexible sampling extension for monitoring and security applications in openflow. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  165. Song, H.: Protocol-oblivious forwarding: unleash the power of SDN through a future-proof forwarding plane. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  166. Martins, J., Ahmed, M., Raiciu, C., Huici, F.: Enabling fast, dynamic network processing with clickOS. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  167. Wen, X., Chen, Y., Hu, C., Shi, C., Wang, Y.: Towards a secure controller platform for openflow applications. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  168. Heller, B., Scott, C., McKeown, N., Shenker, S., Wundsam, A., Zeng, H., Whitlock, S., Jeyakumar, V., Handigol, N., McCauley, J., Zarifis, K., Kazemian, P.: Leveraging SDN layering to systematically troubleshoot networks. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  169. Katta, N.P., Rexford, J., Walker, D.: Incremental consistent updates. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  170. Benton, K., Camp, L.J., Small, C.: OpenFlow vulnerability assessment. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  171. Barkai, S., Katz, R., Farinacci, D., Meyer, D.: Software defined flow-mapping for scaling virtualized network functions. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  172. Hong, K., Lillethun, D., Ramachandran, U., Ottenwälder, B., Koldehofe, B.: Mobile fog: a programming model for large-scale applications on the internet of things. In: MCC ’13: Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, August 2013

    Google Scholar 

  173. Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  174. Reitblatt, M., Canini, M., Guha, A., Foster, N.: FatTire: declarative fault tolerance for software-defined networks. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  175. Nelson, T., Guha, A., Dougherty, D.J., Fisler, K., Krishnamurthi, S.: A balance of power: expressive, analyzable controller programming. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013

    Google Scholar 

  176. Qazi, A., Tu, C.-C., Chiang, L., Miao, R., Sekar, V., Yu, M.: SIMPLE-fying middlebox policy enforcement using SDN Zafar. In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013

    Google Scholar 

  177. Crisan, D., Birke, R., Cressier, G., Minkenberg, C., Gusat, M.: Got loss? Get zOVN! In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013

    Google Scholar 

  178. Qazi, Z.A., Lee, J., Jin, T., Bellala, G., Arndt, M., Noubir, G.: Application-awareness in SDN. In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013

    Google Scholar 

  179. Patel, P., Bansal, D., Yuan, L., Murthy, A., Greenberg, A., Maltz, D.A., Kern, R., Kumar, H., Zikos, M., Wu, H., Kim, C., Karri, N.: Ananta: cloud scale load balancing. In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013

    Google Scholar 

  180. Ferguson, A.D., Guha, A., Liang, C., Fonseca, R., Krishnamurthi, S.: Participatory networking: an API for application control of SDNs. In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013

    Google Scholar 

  181. Jain, S., Kumar, A., Mandal, S., Ong, J., Poutievski, L., Singh, A., Venkata, S., Wanderer, J., Zhou, J., Zhu, M., Zolla, J., Hölzle, U., Stuart, S., Vahdat, A.: B4: experience with a globally-deployed software defined wan. In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013

    Google Scholar 

  182. Gember, A., Grandl, R., Khalid, J., Akella, A.: Design and implementation of a framework for software-defined middlebox networking. In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013

    Google Scholar 

  183. Ganegedara, T., Prasanna, V.: A comprehensive performance analysis of virtual routers on FPGA. Trans. Reconfigurable Technol. Syst. 6(2), 1–2 (2013)

    Article  Google Scholar 

  184. Koldehofe, B., Dürr, F., Tariq, M.A.: Tutorial: event-based systems meet software-defined networking. In: DEBS ’13: Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems, June 2013

    Google Scholar 

  185. Pescapé, A., Fernandes, S.: Proceedings of the first edition Workshop on High Performance and Programmable Networking. In: HPPN ’13: Proceedings of the First Edition Workshop on High Performance and Programmable Networking, June 2013

    Google Scholar 

  186. Gill, H., Lin, D., Han, X., Nguyen, C., Gill, T., Loo, B.T.: Scalanytics: a declarative multi-core platform for scalable composable traffic analytics. In: HPDC ’13: Proceedings of the 22nd International Symposium on High-performance Parallel and Distributed Computing, June 2013

    Google Scholar 

  187. Cui, Z., Bridges, P.G., Lange, J.R., Dinda, P.A.: Virtual TCP offload: optimizing ethernet overlay performance on advanced interconnects. In: HPDC ’13: Proceedings of the 22nd International Symposium on High-performance Parallel and Distributed Computing, June 2013

    Google Scholar 

  188. Guha, A., Reitblatt, M., Foster, N.: Machine-verified network controllers. In: PLDI ’13: Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, June 2013

    Google Scholar 

  189. Marotta, A., Carrozza, G., Avallone, S., Manetti, V.: An OpenFlow-based architecture for IaaS security. In: ATACCS ’13: Proceedings of the 3rd International Conference on Application and Theory of Automation in Command and Control Systems, May 2013

    Google Scholar 

  190. Jin, D., Nicol, D.M.: Parallel simulation of software defined networks. In: SIGSIM-PADS ’13: Proceedings of the 2013 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, May 2013

    Google Scholar 

  191. Zhang, Z., Wu, C., Cheung, D.W.L.: A survey on cloud interoperability, taxonomies, standards, and practice. SIGMETRICS Perform. Eval. Rev. 40(4), 13–22 (2013)

    Article  Google Scholar 

  192. Costa-Pérez, X., Festag, A., Kolbe, H.-J., Quittek, J., Schmid, S., Stiemerling, M., Swetina, J., van der Veen, H.: Latest trends in telecommunication standards. SIGCOMM Comput. Commun. Rev. 43(2), 64–71 (2013)

    Article  Google Scholar 

  193. Skowyra, R.W., Lapets, A., Bestavros, A., Kfoury, A.: Verifiably-safe software-defined networks for CPS. In: HiCoNS ’13: Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems, April 2013

    Google Scholar 

  194. Braun, T., Mauthe, A., Siris, V.: Service-centric networking extensions. In: SAC ’13: Proceedings of the 28th Annual ACM Symposium on Applied Computing, March 2013

    Google Scholar 

  195. Madhavapeddy, A., Mortier, R., Rotsos, C., Scott, D., Singh, B., Gazagnaire, T., Smith, S., Hand, S., Crowcroft, J.: Unikernels: library operating systems for the cloud. In: ASPLOS ’13: Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, April 2013

    Google Scholar 

  196. Malkhi, D., van Renesse, R.: Workshop report on LADIS 2012. SIGOPS Oper. Syst. Rev. 47(1) (2013)

    Google Scholar 

  197. Rexford, J., Zave, P.: Report of the DIMACS working group on abstractions for network services, architecture, and implementation. SIGCOMM Comput. Commun. Rev. 43(1), 56–59 (2013)

    Article  Google Scholar 

  198. Brighten Godfrey, P.: Hotnets 2012 highlights. SIGCOMM Comput. Commun. Rev. 43(1), 38–42 (2013)

    Article  Google Scholar 

  199. Sen, S.: New products. Linux J. 2013(225) (2013)

    Google Scholar 

  200. Sen, S.: Review of PODC 2012. SIGACT News 43(4) (2012)

    Google Scholar 

  201. Sun, X., Rao, S.G., Xie, G.G.: Modeling complexity of enterprise routing design. In: CoNEXT ’12: Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies, December 2012

    Google Scholar 

  202. Mendonca, M., Obraczka, K., Turletti, T.: The case for software-defined networking in heterogeneous networked environments. In: CoNEXT Student ’12: Proceedings of the 2012 ACM Conference on CoNEXT Student Workshop, December 2012

    Google Scholar 

  203. Thai, P.W., de Oliveira, J.C.: Decoupling BGP policy from routing with programmable reactive policy control. In: CoNEXT Student ’12: Proceedings of the 2012 ACM Conference on CoNEXT Student Workshop, December 2012

    Google Scholar 

  204. Stephens, B., Cox, A., Felter, W., Dixon, C., Carter, J.: PAST: scalable ethernet for data centers. In: CoNEXT ’12: Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies, December 2012

    Google Scholar 

  205. Soliman, M., Nandy, B., Lambadaris, I., Ashwood-Smith, P.: Source routed forwarding with software defined control, considerations and implications. In: CoNEXT Student ’12: Proceedings of the 2012 ACM Conference on CoNEXT Student Workshop, December 2012

    Google Scholar 

  206. Costa, P., Hu, W., Sekar, V.: Proceedings of the 2012 ACM Conference on CoNEXT Student Workshop. In: CoNEXT Student ’12: Proceedings of the 2012 ACM Conference on CoNEXT Student Workshop, December 2012

    Google Scholar 

  207. Vanbever, L., Vissicchio, S., Pelsser, C., Francois, P., Bonaventure, O.: Lossless migrations of link-state IGPs. IEEE/ACM Trans. Networking 20(6), 1842–1855 (2012)

    Article  Google Scholar 

  208. Gember, A., Dragga, C., Akella, A.: ECOS: leveraging software-defined networks to support mobile application offloading. In: ANCS ’12: Proceedings of the Eighth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, October 2012

    Google Scholar 

  209. Kotronis, V., Dimitropoulos, X., Ager, B.: Outsourcing the routing control logic: better internet routing based on SDN principles. In: HotNets-XI: Proceedings of the 11th ACM Workshop on Hot Topics in Networks, October 2012

    Google Scholar 

  210. Reitblatt, M., Foster, N., Rexford, J., Schlesinger, C., Walker, D.: Abstractions for network update. SIGCOMM Comput. Commun. Rev. 42(4), 323–334 (2012)

    Article  Google Scholar 

  211. Ahmed, M., Huici, F., Jahanpanah, A.: Enabling dynamic network processing with clickOS. SIGCOMM Comput. Commun. Rev. 42(4), 293–294 (2012)

    Article  Google Scholar 

  212. Khurshid, A., Zhou, W., Matthew, C., Brighten Godfrey, P.: Veriflow: verifying network-wide invariants in real time. SIGCOMM Comput. Commun. Rev. 42(4), 467–472 (2012)

    Article  Google Scholar 

  213. Kim, N., Kim, J.W.: Prototype of a programmable computing/networking switch for multi-screen content consumption. In: CFI ’12: Proceedings of the 7th International Conference on Future Internet Technologies, September 2012

    Google Scholar 

  214. Chang, D., Suh, J., Jung, H., Kwon, T.T., Choi, Y.: How to realize CDN interconnection (CDNI) over OpenFlow? In: CFI ’12: Proceedings of the 7th International Conference on Future Internet Technologies, September 2012

    Google Scholar 

  215. Ko, B.J., Pappas, V., Raghavendra, R., Song, Y., Dilmaghani, R.B., Lee, K.-W., Verma, D.: An information-centric architecture for data center networks. In: ICN ’12: Proceedings of the Second Edition of the ICN Workshop on Information-Centric Networking, August 2012

    Google Scholar 

  216. Gutz, S., Story, A., Schlesinger, C., Foster, N.: Splendid isolation: a slice abstraction for software-defined networks. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012

    Google Scholar 

  217. Reitblatt, M., Foster, N., Rexford, J., Schlesinger, C., Walker, D.: Abstractions for network update. In: SIGCOMM ’12: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 2012

    Google Scholar 

  218. Casado, M., Koponen, T., Shenker, S., Tootoonchian, A.: Fabric: a retrospective on evolving SDN. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012

    Google Scholar 

  219. Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012

    Google Scholar 

  220. Rothenberg, C.E., Nascimento, M.R., Salvador, M.R., Corrêa, C.N.A., de Lucena, S.C., Raszuk, R.: Revisiting routing control platforms with the eyes and muscles of software-defined networking. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012

    Google Scholar 

  221. Mogul, J.C., Congdon, P.: Hey, you darned counters! get off my ASIC! In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012

    Google Scholar 

  222. Ahmed, M., Huici, F., Jahanpanah, A.: Enabling dynamic network processing with clickOS. In: SIGCOMM ’12: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 2012

    Google Scholar 

  223. Ghorbani, S., Caesar, M.: Walk the line: consistent network updates with bandwidth guarantees. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012

    Google Scholar 

  224. Porras, P., Shin, S., Yegneswaran, V., Fong, M., Tyson, M., Gu, G.: A security enforcement kernel for OpenFlow networks. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012

    Google Scholar 

  225. Khurshid, A., Zhou, W., Caesar, M., Godfrey, P.B.: VeriFlow: verifying network-wide invariants in real time. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012

    Google Scholar 

  226. Chetty, M., Feamster, N.: Refactoring network infrastructure to improve manageability: a case study of home networking. SIGCOMM Comput. Commun. Rev. 42(3), 54–61 (2012)

    Article  Google Scholar 

  227. Stabler, G., Rosen, A., Goasguen, S., Wang, K.-C.: Elastic IP and security groups implementation using OpenFlow. In: VTDC ’12: Proceedings of the 6th International Workshop on Virtualization Technologies in Distributed Computing Date, June 2012

    Google Scholar 

  228. Monsanto, C., Foster, N., Harrison, R., Walker, D.: A compiler and run-time system for network programming languages. In: POPL ’12: Proceedings of the 39th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 2012

    Google Scholar 

  229. Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., Wilcox, J.: Intelligent design enables architectural evolution. In: HotNets-X: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, November 2011

    Google Scholar 

  230. Reitblatt, M., Foster, N., Rexford, J., Walker, D.: Consistent updates for software-defined networks: change you can believe in! In: HotNets-X: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, November 2011

    Google Scholar 

  231. Lin, P., Bi, J., Hu, H., Feng, T., Jiang, X.: A quick survey on selected approaches for preparing programmable networks. In: AINTEC ’11: Proceedings of the 7th Asian Internet Engineering Conference, November 2011

    Google Scholar 

  232. Benson, T., Akella, A., Shaikh, A., Sahu, S.: CloudNaaS: a cloud networking platform for enterprise applications. In: SOCC ’11: Proceedings of the 2nd ACM Symposium on Cloud Computing, October 2011

    Google Scholar 

  233. Mai, H., Khurshid, A., Agarwal, R., Caesar, M., Godfrey, P.B., King, S.T.: Debugging the data plane with anteater. In: SIGCOMM ’11: Proceedings of the ACM SIGCOMM 2011 Conference, August 2011

    Google Scholar 

  234. Koponen, T., Shenker, S., Balakrishnan, H., Feamster, N., Ganichev, I., Ali, G., Godfrey, P.B., McKeown, N., Parulkar, G., Raghavan, B., Rexford, J., Arianfar, S., Kuptsov, D.: Architecting for innovation. SIGCOMM Comput. Commun. Rev. 41(3) (2011)

    Google Scholar 

  235. Nascimento, M.R., Rothenberg, C.E., Salvador, M.R., Corrêa, C.N.A., de Lucena, S.C., Magalhães, M.F.: Virtual routers as a service: the RouteFlow approach leveraging software-defined networks. In: CFI ’11: Proceedings of the 6th International Conference on Future Internet Technologies, June 2011

    Google Scholar 

  236. Koponen, T., Casado, M., Gude, N., Stribling, J., Poutievski, L., Zhu, M., Ramanathan, R., Iwata, Y., Inoue, H., Hama, T., Shenker, S.: Onix: a distributed control platform for large-scale production networks. In: OSDI’10: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, October 2010

    Google Scholar 

  237. Bremler-Barr, A., Hay, D., Hendler, D., Roth, R.M.: PEDS: a parallel error detection scheme for TCAM devices. IEEE/ACM Trans. Networking 18(5), 1345–1358 (2010)

    Article  Google Scholar 

  238. Rexford, J., Dovrolis, C.: Future Internet architecture: clean-slate versus evolutionary research. Commun. ACM 53(9), 36–40 (2010)

    Article  Google Scholar 

  239. Casado, M., Freedman, M.J., Pettit, J., Luo, J., McKeown, N., Shenker, S.: Ethane: taking control of the enterprise. In: ACM SIGCOMM’07, 2007

    Google Scholar 

  240. McKeown, N., et al.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69–74 (2008)

    Article  Google Scholar 

  241. Song, S.: Improving network health monitoring accuracy based on data fusion for software defined networking. In: Park, J.J., Stojmenovic, I., Choi, M., Xhafa, F. (eds.) Future Information Technology. Springer, Berlin (2014). doi:10.1007/978-3-642-40861-8_65. http://link.springer.com/chapter/10.1007/978-3-642-40861-8_65

    Google Scholar 

  242. Tsugawa, M., Matsunaga, A., Fortes, J.A.B.: Cloud computing security: what changes with software-defined networking? In: Secure Cloud Computing, pp. 77–93. Springer, New York (2014). doi:10.1007/978-1-4614-9278-8_4. http://link.springer.com/chapter/10.1007/978-1-4614-9278-8_4

    Chapter  Google Scholar 

  243. Mehdi, S.A., Khalid, J., Khayam, S.A.: Revisiting traffic anomaly detection using software defined networking. In: Recent Advances in Intrusion Detection, pp. 161–180. Springer, Berlin (2011). doi:10.1007/978-3-642-23644-0_9. http://link.springer.com/chapter/10.1007/978-3-642-23644-0_9

    Chapter  Google Scholar 

  244. Monfared, A.T., Rong, C.: Multi-tenant network monitoring based on software defined networking. In: On the Move to Meaningful Internet Systems: OTM 2013 Conferences, pp. 327–341. Springer, Berlin (2013). doi:10.1007/978-3-642-41030-7_24. http://link.springer.com/chapter/10.1007/978-3-642-41030-7_24

    Google Scholar 

  245. Ruponen, S.: On software-defined networking for rural areas: controlling wireless networks with OpenFlow. In: e-Infrastructure and e-Services for Developing Countries. Springer, Berlin (2014). doi:10.1007/978-3-319-08368-1_5. http://link.springer.com/chapter/10.1007/978-3-319-08368-1_5

    Google Scholar 

  246. Lin, L., Lin, P.: Software-defined networking (SDN) for cloud applications. In: Cloud Computing. Springer, Berlin (2014). doi:10.1007/978-3-319-10530-7_9. http://link.springer.com/chapter/10.1007/978-3-319-10530-7_9

    Google Scholar 

  247. Singh, S., Khan, R.A., Alka, A.: Applicability of software defined networking in campus network. In: Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, pp. 619–627. Springer, Berlin (2015). doi:10.1007/978-3-319-12012-6_68. http://link.springer.com/chapter/10.1007/978-3-319-12012-6_68

    Google Scholar 

  248. Karimzadeh, M., Sperotto, A., Pras, A.: Software defined networking to improve mobility management performance. In: Monitoring and Securing Virtualized Networks and Services, pp. 118–122. Springer, Berlin (2014). doi:10.1007/978-3-662-43862-6_14. http://link.springer.com/chapter/10.1007/978-3-662-43862-6_14

    Google Scholar 

  249. Venmani, D.P., Gourhant, Y., Reynaud, L., Chemouil, P., Zeghlache, D.: Substitution networks based on software defined networking. In: Ad Hoc Networks, pp. 242–259. Springer, Berlin (2013). doi:10.1007/978-3-642-36958-2_17. http://link.springer.com/chapter/10.1007/978-3-642-36958-2_17

    Chapter  Google Scholar 

  250. Ryoo, I., Na, W., Kim, S.: Information exchange architecture based on software defined networking for cooperative intelligent transportation systems. Cluster Comput. 18(2), 771–782 (2015). doi:10.1007/s10586-015-0442-z. http://link.springer.com/article/10.1007/s10586-015-0442-z

    Article  Google Scholar 

  251. Vizváry, M., Vykopal, J.: Future of DDoS attacks mitigation in software defined networks. In: Monitoring and Securing Virtualized Networks and Services, pp. 123–127. Springer, Berlin (2014). doi:10.1007/978-3-662-43862-6_15. http://link.springer.com/chapter/10.1007/978-3-662-43862-6_15

    Google Scholar 

  252. Tantar, E., Palattella, M.R., Avanesov, T., Kantor, M., Engel, T.: Cognition: a tool for reinforcing security in software defined networks. In: EVOLVE—A Bridge Between Probability, Set Oriented Numerics, and Evolutionary Computation, pp. 61–78. Springer, Berlin (2014). doi:10.1007/978-3-319-07494-8_6. http://link.springer.com/chapter/10.1007/978-3-319-07494-8_6

    Google Scholar 

  253. Han, W., Hu, H., Ahn, G.-J.: LPM: layered policy management for software-defined networks. In: Data and Applications Security and Privacy XXVIII, pp. 356–363. Springer, Berlin (2014). doi:10.1007/978-3-662-43936-4_23. http://link.springer.com/chapter/10.1007/978-3-662-43936-4_23

    Google Scholar 

  254. Zakharov, V.A., Smelyansky, R.L., Chemeritsky, E.V.: A formal model and verification problems for software defined networks. Autom. Cont. Comp. Sci. 48(7), 398–406 (2014). doi:10.3103/S0146411614070165. http://link.springer.com/article/10.3103/S0146411614070165

    Article  Google Scholar 

  255. He, S., Jianwei, L., Mao, J., Jie, C.: Hierarchical solution for access control and authentication in software defined networks. In: Network and System Security, pp. 70–81. Springer, Berlin (2014). doi:10.1007/978-3-319-11698-3_6. http://link.springer.com/chapter/10.1007/978-3-319-11698-3_6

    Google Scholar 

  256. Kim, D., Byeon, O., Cho, K.: Federated software defined network operations for LHC experiments. J. Korean Phys. Soc. 63(5), 975–981 (2013). doi:10.3938/jkps.63.975. http://link.springer.com/article/10.3938/jkps.63.975

    Article  Google Scholar 

  257. Marconett, D., Yoo, S.J.B.: FlowBroker: a software-defined network controller architecture for multi-domain brokering and reputation. J. Netw. Syst. Manage. 23(2), 328–359 (2015). doi:10.1007/s10922-014-9325-5. http://link.springer.com/article/10.1007/s10922-014-9325-5

    Article  Google Scholar 

  258. Khasnabish, B., Choi, B.-Y., Feamster, N.: JONS: special issue on management of software-defined networks. J. Netw. Syst. Manage. 23(2), 249–251 (2015). doi:10.1007/s10922-014-9339-z. http://link.springer.com/article/10.1007/s10922-014-9339-z

    Article  Google Scholar 

  259. Kim, D., Gil, J.-M.: Reliable and fault-tolerant software-defined network operations scheme for remote 3D printing. J. Electron. Mater. 44(3), 804–814 (2015). doi:10.1007/s11664-014-3548-9. http://link.springer.com/article/10.1007/s11664-014-3548-9

    Article  MathSciNet  Google Scholar 

  260. Rass, S., Rainer, B., Vavti, M., Göllner, J., Peer, A., Schauer, S.: Secure communication over software-defined networks. Mob. Netw. Appl. 20(1), 105–110 (2015). doi:10.1007/s11036-015-0582-7. http://link.springer.com/article/10.1007/s11036-015-0582-7

    Article  Google Scholar 

  261. Sun, P., Yu, M., Freedman, M.J., Rexford, J., Walker, D.: HONE: joint host-network traffic management in software-defined networks. J. Netw. Syst. Manage. 23(2), 374–399 (2015). doi:10.1007/s10922-014-9321-9. http://link.springer.com/article/10.1007/s10922-014-9321-9

    Article  Google Scholar 

  262. Heorhiadi, V., Fayaz, S.K., Reiter, M.K., Sekar, V.: SNIPS: a software-defined approach for scaling intrusion prevention systems via offloading. In: Information Systems Security, pp. 9–29. Springer, Berlin (2014). doi:10.1007/978-3-319-13841-1_2. http://link.springer.com/chapter/10.1007/978-3-319-13841-1_2

    Google Scholar 

  263. Bhaumik, P., Zhang, S., Chowdhury, P., Lee, S.-S., Lee, J.H., Mukherjee, B.: Software-defined optical networks (SDONs): a survey. Photonic Netw. Commun. 28(1), 4–18 (2014). doi:10.1007/s11107-014-0451-5. http://link.springer.com/article/10.1007/s11107-014-0451-5

    Article  Google Scholar 

  264. Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., Vasilakos, A.V.: Software-defined and virtualized future mobile and wireless networks: a survey. Mob. Netw. Appl. 20(1), 4–18 (2015). doi:10.1007/s11036-014-0533-8. http://link.springer.com/article/10.1007/s11036-014-0533-8

    Article  Google Scholar 

  265. Wang, Y., Bi, J., Zhang, K.: Design and implementation of a software-defined mobility architecture for IP networks. Mob. Netw. Appl. 20(1), 40–52 (2015). doi:10.1007/s11036-015-0579-2. http://link.springer.com/article/10.1007/s11036-015-0579-2

    Article  Google Scholar 

  266. Qadir, J., Ahmed, N., Ahad, N.: Building programmable wireless networks: an architectural survey. EURASIP J. Wireless Commun. Network. 1, 172 (2014). doi:10.1186/1687-1499-2014-172. http://link.springer.com/article/10.1186/1687-1499-2014-172

    Article  Google Scholar 

  267. Ben Yoo, S.J., Liu, L., Proietti, R., Scott, R.P.: Software defined elastic optical networking in temporal, spectral, and spatial domains. Photonic Netw. Commun. 28(1), 19–33 (2014). doi:10.1007/s11107-014-0448-0. http://link.springer.com/article/10.1007/s11107-014-0448-0

    Article  Google Scholar 

  268. Li, Y., Vasilakos, A.V.: Editorial: software-defined and virtualized future wireless networks. Mob. Netw. Appl. 20(1), 1–3 (2015). doi:10.1007/s11036-015-0569-4. http://link.springer.com/article/10.1007/s11036-015-0569-4

    Article  Google Scholar 

  269. Rückert, J., Blendin, J., Hausheer, D.: Software-defined multicast for over-the-top and overlay-based live streaming in ISP networks. J. Netw. Syst. Manage. 23(2), 280–308 (2015). doi:10.1007/s10922-014-9322-8. http://link.springer.com/article/10.1007/s10922-014-9322-8

    Article  Google Scholar 

  270. Bae, H.-B., Park, M.-W., Kim, S.-H., Chung, T.-M.: Zombie PC detection and treatment model on software-defined network. In: Computer Science and Its Applications, pp. 837–843. Springer, Berlin (2015). doi:10.1007/978-3-662-45402-2_119. http://link.springer.com/chapter/10.1007/978-3-662-45402-2_119

    Google Scholar 

  271. Bruni, R., Montanari, U., Sammartino, M.: Reconfigurable and software-defined networks of connectors and components. In: Software Engineering for Collective Autonomic Systems, pp. 73–106. Springer, Berlin (2015). doi:10.1007/978-3-319-16310-9_2. http://link.springer.com/chapter/10.1007/978-3-319-16310-9_2

    Google Scholar 

  272. Xiao, X.F., Kui, X.: The characterizes of communication contacts between vehicles and intersections for software-defined vehicular networks. Mob. Netw. Appl. 20(1), 98–104 (2015). doi:10.1007/s11036-014-0535-6. http://link.springer.com/article/10.1007/s11036-014-0535-6

    Article  Google Scholar 

  273. Yu, C., Lumezanu, C., Sharma, A., Xu, Q., Jiang, G., Madhyastha, H.V.: Software-defined latency monitoring in data center networks. In: Passive and Active Measurement, pp. 360–372. Springer, Berlin (2015). doi:10.1007/978-3-319-15509-8_27. http://link.springer.com/chapter/10.1007/978-3-319-15509-8_27

    Google Scholar 

  274. Nikitinskiy, M.A., Alekseev, I.V.: Analyzing the possibility of applying asymmetric transport protocols in terms of software defined networks. Autom. Cont. Comput. Sci. 49(2), 94–102 (2015). doi:10.3103/S0146411615020042. http://link.springer.com/article/10.3103/S0146411615020042

    Article  Google Scholar 

  275. Geske, J., Stanchev, P.: Next-generation internet projects. In: Distributed Computer and Communication Networks, pp. 1–10. Springer, Berlin (2014). doi:10.1007/978-3-319-05209-0_1. http://link.springer.com/chapter/10.1007/978-3-319-05209-0_1

    Chapter  Google Scholar 

  276. Jung, J.K., Hong, J.H., Chung, T.M.: A study of reducing resource waste for mobile grid with software defined network. In: Computational Science and Its Applications—ICCSA 2014, pp. 755–765. Springer, Berlin (2014). doi:10.1007/978-3-319-09147-1_55. http://link.springer.com/chapter/10.1007/978-3-319-09147-1_55

    Google Scholar 

  277. Simmons, J.M.: Dynamic optical networking. In: Optical Network Design and Planning, pp. 349–399. Springer, Berlin (2014). doi:10.1007/978-3-319-05227-4_8. http://link.springer.com/chapter/10.1007/978-3-319-05227-4_8

    Chapter  Google Scholar 

  278. De Turck, F., Kiriha, Y., Hong, J.W.-K.: Management of the future internet: status and challenges. J. Netw. Syst. Manage. 20(4), 616–624 (2012). doi:10.1007/s10922-012-9245-1. http://link.springer.com/article/10.1007/s10922-012-9245-1

    Article  Google Scholar 

  279. Chávez-Santiago, R., Szydełko, M., Kliks, A., Foukalas, F., Haddad, Y., Nolan, K.E., Kelly, M.Y., Masonta, M.T., Balasingham, I.: 5G: the convergence of wireless communications. Wireless Pers. Commun. (2015). doi:10.1007/s11277-015-2467-2. http://link.springer.com/article/10.1007/s11277-015-2467-2

    Google Scholar 

  280. Carrozza, G., Manetti, V., Marotta, A., Canonico, R., Avallone, S.: Exploiting SDN approach to tackle cloud computing security issues in the ATC scenario. In: Dependable Computing, pp. 54–60. Springer, Berlin (2013). doi:10.1007/978-3-642-38789-0_5. http://link.springer.com/chapter/10.1007/978-3-642-38789-0_5

    Chapter  Google Scholar 

  281. Kozen, D.: NetKAT—a formal system for the verification of networks. In: Programming Languages and Systems, pp. 1–18. Springer, Berlin (2014). doi:10.1007/978-3-319-12736-1_1. http://link.springer.com/chapter/10.1007/978-3-319-12736-1_1

    Google Scholar 

  282. Sim, J.-H., Kim, S.-H., Park, M.-W., Chung, T.-M.: Eliminating duplicated paths to reduce computational cost of rule generation by using SDN. In: Computational Science and Its Applications—ICCSA 2014, pp. 603–613. Springer, Berlin (2014). doi:10.1007/978-3-319-09153-2_45. http://link.springer.com/chapter/10.1007/978-3-319-09153-2_45

    Google Scholar 

  283. Anderson, R., Hall, C.: Collaborating with the enemy on network management (transcript of discussion). In: Security Protocols XXII, pp. 163–171. Springer, Berlin (2014). doi:10.1007/978-3-319-12400-1_16. http://link.springer.com/chapter/10.1007/978-3-319-12400-1_16

    Google Scholar 

  284. Yeluri, R., Castro-Leon, E.: Network security in the cloud. In: Building the Infrastructure for Cloud Security, pp. 123–140. Springer, Berlin (2014). doi:10.1007/978-1-4302-6146-9_6. http://link.springer.com/chapter/10.1007/978-1-4302-6146-9_6

    Chapter  Google Scholar 

  285. Clemm, A.: Network-embedded management. In: Network-Embedded Management and Applications, pp. 59–78. Springer, Berlin (2013). doi:10.1007/978-1-4419-6769-5_3. http://link.springer.com/chapter/10.1007/978-1-4419-6769-5_3

    Chapter  Google Scholar 

  286. Hurel, G., Badonnel, R., Lahmadi, A., Festor, O.: Outsourcing mobile security in the cloud. In: Monitoring and Securing Virtualized Networks and Services, pp. 69–73. Springer, Berlin (2014). doi:10.1007/978-3-662-43862-6_9. http://link.springer.com/chapter/10.1007/978-3-662-43862-6_9

    Google Scholar 

  287. Ho, Q.-D., Gao, Y., Rajalingham, G., Le-Ngoc, T.: SGCN: further aspects and issues. In: Wireless Communications Networks for the Smart Grid, pp. 99–108. Springer, Berlin (2014). doi:10.1007/978-3-319-10347-1_6. http://link.springer.com/chapter/10.1007/978-3-319-10347-1_6

    Google Scholar 

  288. Zaalouk, A., Pentikousis, K.: Network configuration in OpenFlow networks. In: Mobile Networks and Management, pp. 91–104. Springer, Berlin (2015). doi:10.1007/978-3-319-16292-8_7. http://link.springer.com/chapter/10.1007/978-3-319-16292-8_7

    Google Scholar 

  289. Eckert, M., Knoll, T.M.: QoE management framework for internet services in SDN enabled mobile networks. In: Advances in Communication Networking, pp. 112–123. Springer, Berlin (2013). doi:10.1007/978-3-642-40552-5_11. http://link.springer.com/chapter/10.1007/978-3-642-40552-5_11

    Chapter  Google Scholar 

  290. Wang, J., Wang, Y., Hu, H., Sun, Q., He, S., Zeng, L.: Towards a security-enhanced firewall application for OpenFlow networks. In: Cyberspace Safety and Security, pp. 92–103. Springer, Berlin (2013). doi:10.1007/978-3-319-03584-0_8. http://link.springer.com/chapter/10.1007/978-3-319-03584-0_8

    Chapter  Google Scholar 

  291. Minerva, R., Manzalini, A., Moiso, C., Crespi, N.: Virtualizing network. In: Evolution of Telecommunication Services, pp. 227–256. Springer, Berlin (2013). doi:10.1007/978-3-642-41569-2_12. http://link.springer.com/chapter/10.1007/978-3-642-41569-2_12

    Chapter  Google Scholar 

  292. Choi, T., Lee, B., Kang, S., Song, S., Park, H., Yoon, S., Yang, S.: IRIS-CoMan: scalable and reliable control and management architecture for SDN-enabled large-scale networks. J. Netw. Syst. Manage. 23(2), 252–279 (2015). doi:10.1007/s10922-015-9341-0. http://link.springer.com/article/10.1007/s10922-015-9341-0

    Article  Google Scholar 

  293. Wen, H., Tiwary, P.K., Le-Ngoc, T.: Network virtualization technologies and techniques. In: Wireless Virtualization, pp. 25–40. Springer, Berlin (2013). doi:10.1007/978-3-319-01291-9_4. http://link.springer.com/chapter/10.1007/978-3-319-01291-9_4

    Chapter  Google Scholar 

  294. Matsubara, D., Egawa, T., Nishinaga, N., Shin, M.-K., Kafle, V.P., Galis, A.: Open the way to future networks—a viewpoint framework from ITU-T. In: The Future Internet, pp. 27–38. Springer, Berlin (2013). doi:10.1007/978-3-642-38082-2_3. http://link.springer.com/chapter/10.1007/978-3-642-38082-2_3

    Chapter  Google Scholar 

  295. Lin, P., Bi, J., Wang, Y.: East-west bridge for SDN network peering. In: Frontiers in Internet Technologies, pp. 170–181. Springer, Berlin (2013). doi:10.1007/978-3-642-53959-6_16. http://link.springer.com/chapter/10.1007/978-3-642-53959-6_16

    Chapter  Google Scholar 

  296. Banjar, A., Pupatwibul, P., Braun, R.: Comparison of TCP/IP routing versus OpenFlow table and implementation of intelligent computational model to provide autonomous behavior. In: Computational Intelligence and Efficiency in Engineering Systems, pp. 121–142. Springer, Berlin (2015). doi:10.1007/978-3-319-15720-7_9. http://link.springer.com/chapter/10.1007/978-3-319-15720-7_9

    Google Scholar 

  297. Alberti, A.M.: A conceptual-driven survey on future internet requirements, technologies, and challenges. J. Braz. Comput. Soc. 19(3), 291–311 (2013). doi:10.1007/s13173-013-0101-2. http://link.springer.com/article/10.1007/s13173-013-0101-2

    Article  Google Scholar 

  298. Derakhshan, F., Grob-Lipski, H., Roessler, H., Schefczik, P., Soellner, M.: Enabling cloud connectivity using SDN and NFV technologies. In: Mobile Networks and Management, pp. 245–258. Springer, Berlin (2013). doi:10.1007/978-3-319-04277-0_19. http://link.springer.com/chapter/10.1007/978-3-319-04277-0_19

    Chapter  Google Scholar 

  299. Owezarski, P., Lobo, J., Medhi, D.: Network and service management for cloud computing and data centers: a report on CNSM 2012. J. Netw. Syst. Manage. 21(4), 707–712 (2013). doi:10.1007/s10922-013-9281-5. http://link.springer.com/article/10.1007/s10922-013-9281-5

    Article  Google Scholar 

  300. Stewart, G.: Computational verification of network programs in Coq. In: Certified Programs and Proofs, pp. 33–49. Springer, Berlin (2013). doi:10.1007/978-3-319-03545-1_3. http://link.springer.com/chapter/10.1007/978-3-319-03545-1_3

    Chapter  Google Scholar 

  301. Dobrijevic, O., Kassler, A.J., Skorin-Kapov, L., Matijasevic, M.: Q-POINT: QoE-driven path optimization model for multimedia services. In: Wired/Wireless Internet Communications, pp. 134–147. Springer, Berlin (2014). doi:10.1007/978-3-319-13174-0_11. http://link.springer.com/chapter/10.1007/978-3-319-13174-0_11

    Google Scholar 

  302. Galis, A., Rubio-Loyola, J., Clayman, S., Mamatas, L., Kukliński, S., Serrat, J., Zahariadis, T.: Software enabled future internet—challenges in orchestrating the future internet. In: Mobile Networks and Management, pp. 228–244. Springer, Berlin (2013). doi:10.1007/978-3-319-04277-0_18. http://link.springer.com/chapter/10.1007/978-3-319-04277-0_18

    Chapter  Google Scholar 

  303. Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Famaey, J., Velan, P., Čeleda, P.: Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014). J. Netw. Syst. Manage. (2015). doi:10.1007/s10922-015-9346-8. http://link.springer.com/article/10.1007/s10922-015-9346-8

    Google Scholar 

  304. Gavrilovska, L., Rakovic, V., Atanasovski, V.: Visions towards 5G: technical requirements and potential enablers. Wireless Pers. Commun. (2015). doi:10.1007/s11277-015-2632-7. http://link.springer.com/article/10.1007/s11277-015-2632-7

    Google Scholar 

  305. Song, Y.J., Shin, S., Choi, Y.: Network iron curtain: hide enterprise networks with OpenFlow. In: Information Security Applications, pp. 218–230. Springer, Berlin (2014). doi:10.1007/978-3-319-05149-9_14. http://link.springer.com/chapter/10.1007/978-3-319-05149-9_14

    Chapter  Google Scholar 

  306. Hall, C., Yu, D., Zhang, Z.-l., Stout, J., Odlyzko, A., Moore, A.W., Camp, J., Benton, K., Anderson, R.: Collaborating with the enemy on network management. In: Security Protocols XXII, pp. 154–162. Springer, Berlin (2014). doi:10.1007/978-3-319-12400-1_15. http://link.springer.com/chapter/10.1007/978-3-319-12400-1_15

    Google Scholar 

  307. Watashiba, Y., Date, S., Abe, H., Kido, Y., Ichikawa, K., Yamanaka, H., Kawai, E., Shimojo, S., Takemura, H.: Efficacy analysis of a SDN-enhanced resource management system through NAS parallel benchmarks. Rev. Socionetw. Strateg. 8(2), 69–84 (2014). doi:10.1007/s12626-014-0045-9. http://link.springer.com/article/10.1007/s12626-014-0045-9

    Article  Google Scholar 

  308. Chau, N.-T., Nguyen, M.-D., Jung, S., Jung, S.: SecaaS framework and architecture: a design of dynamic packet control. In: Information Security Applications, pp. 190–201. Springer, Berlin (2015). doi:10.1007/978-3-319-15087-1_15. http://link.springer.com/chapter/10.1007/978-3-319-15087-1_15

    Google Scholar 

  309. Armando, A., Castiglione, A., Costa, G., Fiore, U., Merlo, A., Verderame, L., You, I.: Trustworthy opportunistic access to the internet of services. In: Information and Communication Technology, pp. 469–478. Springer, Berlin (2013). doi:10.1007/978-3-642-36818-9_52. http://link.springer.com/chapter/10.1007/978-3-642-36818-9_52

    Google Scholar 

  310. Tsugawa, M., Matsunaga, A., Fortes, J.A.B.: Cloud networking to support data intensive applications. In: Cloud Computing for Data-Intensive Applications, pp. 61–81. Springer, Berlin (2014). doi:10.1007/978-1-4939-1905-5_3. http://link.springer.com/chapter/10.1007/978-1-4939-1905-5_3

    Google Scholar 

  311. Lo, C.-C., Chin, H.-H., Horng, M.-F., Kuo, Y.-H., Hsu, J.-P.: A flexible network management framework based on OpenFlow technology. In: Modern Advances in Applied Intelligence, pp. 298–307. Springer, Berlin (2014). doi:10.1007/978-3-319-07467-2_32. http://link.springer.com/chapter/10.1007/978-3-319-07467-2_32

    Chapter  Google Scholar 

  312. Rak, J., Pickavet, M., Trivedi, K.S., Lopez, J.A., Koster, A.M.C.A., Sterbenz, J.P.G., Çetinkaya, E.K., Gomes, T., Gunkel, M., Walkowiak, K., Staessens, D.: Future research directions in design of reliable communication systems. Telecommun. Syst. (2015). doi:10.1007/s11235-015-9987-7. http://link.springer.com/article/10.1007/s11235-015-9987-7

    Google Scholar 

  313. Maini, E., Manzalini, A.: Management and orchestration of virtualized network functions. In: Monitoring and Securing Virtualized Networks and Services, pp. 52–56. Springer, Berlin (2014). doi:10.1007/978-3-662-43862-6_6. http://link.springer.com/chapter/10.1007/978-3-662-43862-6_6

    Google Scholar 

  314. Tomovic, S., Pejanovic-Djurisic, M., Radusinovic, I.: SDN based mobile networks: concepts and benefits. Wireless Pers. Commun. 78(3), 1629–1644 (2014). doi:10.1007/s11277-014-1909-6. http://link.springer.com/article/10.1007/s11277-014-1909-6

    Article  Google Scholar 

  315. Chen, M., Mao, S., Zhang, Y., Leung, V.C.M.: Open issues and outlook. In: Big Data, pp. 81–89. Springer, Berlin (2014). doi:10.1007/978-3-319-06245-7_7. http://link.springer.com/chapter/10.1007/978-3-319-06245-7_7

    Chapter  Google Scholar 

  316. de Oliveira Silva, F., Dias, A., Ferreira, C.C., De Souza Santos, E., Pereira, F.S.F., de Andrade, I.C., de Souza Pereira, J.H., Camargos, L.J., Theodoro, L.C., Gonçalves, M.A., Pasquini, R., José, A., Neto, V., Rosa, P.F., Kofuji, S.T.: Semantically enriched services to understand the need of entities. In: The Future Internet, pp. 142–153. Springer, Berlin (2012). doi:10.1007/978-3-642-30241-1_13. http://link.springer.com/chapter/10.1007/978-3-642-30241-1_13

    Chapter  Google Scholar 

  317. Benamrane, F., Mamoun, M.B., Benaini, R.: Short: a case study of the performance of an OpenFlow controller. In: Networked Systems, pp. 330–334. Springer, Berlin (2014). doi:10.1007/978-3-319-09581-3_25. http://link.springer.com/chapter/10.1007/978-3-319-09581-3_25

    Google Scholar 

  318. Antikainen, M., Aura, T., Särelä, M.: Spook in your network: attacking an SDN with a compromised OpenFlow switch. In: Secure IT Systems, pp. 229–244. Springer, Berlin (2014). doi:10.1007/978-3-319-11599-3_14. http://link.springer.com/chapter/10.1007/978-3-319-11599-3_14

    Google Scholar 

  319. Aldaya, I., Cafini, R., Cerroni, W., Raffaelli, C., Savi, M.: Optical switch emulation in programmable software router testbed. Photonic Netw. Commun. 25(1), 10–23 (2013). doi:10.1007/s11107-012-0386-7. http://link.springer.com/article/10.1007/s11107-012-0386-7

    Article  Google Scholar 

  320. Kim, D., Gil, J.-M., Wang, G., Kim, S.-H.: Integrated SDN and non-SDN network management approaches for future internet environment. In: Multimedia and Ubiquitous Engineering, pp. 529–536. Springer, Berlin (2013). doi:10.1007/978-94-007-6738-6_64. http://link.springer.com/chapter/10.1007/978-94-007-6738-6_64

    Chapter  Google Scholar 

  321. Fernandez, E.B., Monge, R., Hashizume, K.: Building a security reference architecture for cloud systems. Requir. Eng. (2015). doi:10.1007/s00766-014-0218-7. http://link.springer.com/article/10.1007/s00766-014-0218-7

    Google Scholar 

  322. Dongting, Y.: Authentication for resilience: the case of SDN (transcript of discussion). In: Security Protocols XXI, pp. 45–53. Springer, Berlin (2013). doi:10.1007/978-3-642-41717-7_7. http://link.springer.com/chapter/10.1007/978-3-642-41717-7_7

    Google Scholar 

  323. Gardiner, J., Nagaraja, S.: On the reliability of network measurement techniques used for malware traffic analysis. In: Security Protocols XXII, pp. 321–333. Springer, Berlin (2014). doi:10.1007/978-3-319-12400-1_31. http://link.springer.com/chapter/10.1007/978-3-319-12400-1_31

    Google Scholar 

  324. Zhang, S., Malik, S.: SAT based verification of network data planes. In: Automated Technology for Verification and Analysis, pp. 496–505. Springer, Berlin (2013). doi:10.1007/978-3-319-02444-8_43. http://link.springer.com/chapter/10.1007/978-3-319-02444-8_43

    Chapter  Google Scholar 

  325. Kukliński, S., Wytrębowicz, J., Dinh, K.T., Tantar, E.: Application of cognitive techniques to network management and control. In: EVOLVE—A Bridge Between Probability, Set Oriented Numerics, and Evolutionary Computation V, pp. 79–93. Springer, Berlin (2014). doi:10.1007/978-3-319-07494-8_7. http://link.springer.com/chapter/10.1007/978-3-319-07494-8_7

    Google Scholar 

  326. Jafarian, J.H., Al-Shaer, E., Duan, Q.: Formal approach for route agility against persistent attackers. In: Computer Security—ESORICS 2013, pp. 237–254. Springer, Berlin (2013). doi:10.1007/978-3-642-40203-6_14. http://link.springer.com/chapter/10.1007/978-3-642-40203-6_14

    Chapter  Google Scholar 

  327. Park, B., Lee, W., Kim, T.Y., Kim, H.C.: A virtualization and management architecture of micro-datacenter. In: Information Science and Applications, pp. 181–187. Springer, Berlin (2015). doi:10.1007/978-3-662-46578-3_22. http://link.springer.com/chapter/10.1007/978-3-662-46578-3_22

    Chapter  Google Scholar 

  328. Bertier, M., Desprez, F., Fedak, G., Lebre, A., Orgerie, A.-C., Pastor, J., Quesnel, F., Rouzaud-Cornabas, J., Tedeschi, C.: Beyond the clouds: how should next generation utility computing infrastructures be designed? In: Cloud Computing, pp. 325–345. Springer, Berlin (2014). doi:10.1007/978-3-319-10530-7_14. http://link.springer.com/chapter/10.1007/978-3-319-10530-7_14

    Google Scholar 

  329. Alberti, A.M.: Searching for synergies among future internet ingredients. In: Convergence and Hybrid Information Technology, pp. 61–68. Springer, Berlin (2012). doi:10.1007/978-3-642-32692-9_9. http://link.springer.com/chapter/10.1007/978-3-642-32692-9_9

    Chapter  Google Scholar 

  330. Seppänen, K., Kilpi, J., Suihko, T.: Integrating WMN based mobile backhaul with SDN control. Mob. Netw. Appl. 20(1), 32–39 (2015). doi:10.1007/s11036-015-0574-7. http://link.springer.com/article/10.1007/s11036-015-0574-7

    Article  Google Scholar 

  331. Lv, G., Sun, Z., Chen, Y., Li, T.: Towards internet innovation: software defined data plane. In: Frontiers in Internet Technologies, pp. 236–247. Springer, Berlin (2013). doi:10.1007/978-3-642-53959-6_21. http://link.springer.com/chapter/10.1007/978-3-642-53959-6_21

    Chapter  Google Scholar 

  332. Bozakov, Z., Sander, V.: OpenFlow: a perspective for building versatile networks. In: Network-Embedded Management and Applications, pp. 217–245. Springer, Berlin (2013). doi:10.1007/978-1-4419-6769-5_11. http://link.springer.com/chapter/10.1007/978-1-4419-6769-5_11

    Chapter  Google Scholar 

  333. Kuźniar, M., Perešíni, P., Kostić, D.: What you need to know about SDN flow tables. In: Passive and Active Measurement, pp. 347–359. Springer, Berlin (2015). doi:10.1007/978-3-319-15509-8_26. http://link.springer.com/chapter/10.1007/978-3-319-15509-8_26

    Google Scholar 

  334. Yu, D., Moore, A.W., Hall, C., Anderson, R.: Authentication for resilience: the case of SDN. In: Security Protocols XXI, pp. 39–44. Springer, Berlin (2013). doi:10.1007/978-3-642-41717-7_6. http://link.springer.com/chapter/10.1007/978-3-642-41717-7_6

    Chapter  Google Scholar 

  335. Fortino, G., Di Fatta, G., Pathan, M., Vasilakos, A.V.: Cloud-assisted body area networks: state-of-the-art and future challenges. Wireless Netw. 20(7), 1925–1938 (2014). doi:10.1007/s11276-014-0714-1. http://link.springer.com/article/10.1007/s11276-014-0714-1

    Article  Google Scholar 

  336. Minerva, R., Moiso, C., Manzalini, A., Crespi, N.: Virtualizing platforms. In: Evolution of Telecommunication Services, pp. 203–226. Springer, Berlin (2013). doi:10.1007/978-3-642-41569-2_11. http://link.springer.com/chapter/10.1007/978-3-642-41569-2_11

    Chapter  Google Scholar 

  337. De Turck, F., Gaspary, L.P., Betser, J., Zuckerman, D.N., Moore, T.: Managing the next wave of information and communications technologies: a report on NOMS 2012. J. Netw. Syst. Manage. 21(3), 510–516 (2013). doi:10.1007/s10922-013-9274-4. http://link.springer.com/article/10.1007/s10922-013-9274-4

    Article  Google Scholar 

  338. Bjørner, N., Jayaraman, K.: Checking Cloud Contracts in Microsoft Azure. In: Xxxx, X. (ed.) Distributed Computing and Internet Technology, pp. 21–32. Springer, Berlin (2015). doi:10.1007/978-3-319-14977-6_2. http://link.springer.com/chapter/10.1007/978-3-319-14977-6_2

    Google Scholar 

  339. Borokhovich, M., Schmid, S.: How (not) to shoot in your foot with SDN local fast failover. In: Principles of Distributed Systems, pp. 68–82. Springer, Berlin (2013). doi:10.1007/978-3-319-03850-6_6. http://link.springer.com/chapter/10.1007/978-3-319-03850-6_6

    Chapter  Google Scholar 

  340. Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., Inácio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inform. Secur. 13(2), 113–170 (2014). doi:10.1007/s10207-013-0208-7. http://link.springer.com/article/10.1007/s10207-013-0208-7

    Article  Google Scholar 

  341. Logota, E., Saghezchi, F.B., Marques, H., Rodriguez, J.: Cooperative strategies for end-to-end energy saving and QoS control. In: Novel 3D Media Technologies, pp. 135–161. Springer, Berlin (2015). doi:10.1007/978-1-4939-2026-6_8. http://link.springer.com/chapter/10.1007/978-1-4939-2026-6_8

    Google Scholar 

  342. Schultz, G.: Security aspects and principles. In: Architecture and Design for the Future Internet, pp. 115–131. Springer, Berlin (2011). doi:10.1007/978-90-481-9346-2_6. http://link.springer.com/chapter/10.1007/978-90-481-9346-2_6

    Chapter  Google Scholar 

  343. Pawar, P.S., Sajjad, A., Dimitrakos, T., Chadwick, D.W.: Security-as-a-service in multi-cloud and federated cloud environments. In: Trust Management IX, pp. 251–261. Springer, Berlin (2015). doi:10.1007/978-3-319-18491-3_21. http://link.springer.com/chapter/10.1007/978-3-319-18491-3_21

    Google Scholar 

  344. Bays, L.R., Oliveira, R.R., Barcellos, M.P., Gaspary, L.P., Madeira, E.R.M.: Virtual network security: threats, countermeasures, and challenges. J. Internet Serv. Appl. 6, 1 (2015). doi:10.1186/s13174-014-0015-z. http://link.springer.com/article/10.1186/s13174-014-0015-z

    Article  Google Scholar 

  345. Blefari Melazzi, N., Detti, A., Pomposini, M.: Scalability measurements in an information-centric network. In: Measurement Methodology and Tools, pp. 81–106. Springer, Berlin (2013). doi:10.1007/978-3-642-41296-7_6. http://link.springer.com/chapter/10.1007/978-3-642-41296-7_6

    Chapter  Google Scholar 

  346. Lee, B., Murray, N., Qiao, Y.: Active accounting and charging for programmable wireless networks. Mob. Netw. Appl. 20(1), 111–120 (2015). doi:10.1007/s11036-015-0585-4. http://link.springer.com/article/10.1007/s11036-015-0585-4

    Article  Google Scholar 

  347. Melazzi, N.B., Andrade, T., Walker, R., Chiariglione, L., Venieris, I.S., Hussmann, H.: Conclusions and future research topics. In: Enhancing the Internet with the CONVERGENCE System, pp. 263–266. Springer, Berlin (2014). doi:10.1007/978-1-4471-5373-3_10. http://link.springer.com/chapter/10.1007/978-1-4471-5373-3_10

    Chapter  Google Scholar 

  348. Ahamed, S.V., Lawrence, V.B.: The BCR view of intelligent networks (INs). In: Intelligent Broadband Multimedia Networks, pp. 229–249. Springer, Berlin (1997). doi:10.1007/978-1-4615-6341-9_9. http://link.springer.com/chapter/10.1007/978-1-4615-6341-9_9

    Chapter  Google Scholar 

  349. Khasnabish, B., Huang, D., Bai, X., Bellavista, P., Martinez, G., Antonopoulos, N.: Cloud computing, networking, and services. J. Netw. Syst. Manage. 20(4), 463–467 (2012). doi:10.1007/s10922-012-9254-0. http://link.springer.com/article/10.1007/s10922-012-9254-0

    Article  Google Scholar 

  350. Casola, V., De Benedictis, A., Albanese, M.: A multi-layer moving target defense approach for protecting resource-constrained distributed devices. In: Integration of Reusable Systems, pp. 299–324. Springer, Berlin (2014). doi:10.1007/978-3-319-04717-1_14. http://link.springer.com/chapter/10.1007/978-3-319-04717-1_14

    Chapter  Google Scholar 

  351. Ma, Z., Zhang, Z.Q., Ding, Z.G., Fan, P.Z., Li, H.C.: Key techniques for 5G wireless communications: network architecture, physical layer, and MAC layer perspectives. Sci. China Inform. Sci. 58(4), 1–20 (2015). doi:10.1007/s11432-015-5293-y. http://link.springer.com/article/10.1007/s11432-015-5293-y

    Article  Google Scholar 

  352. da Costa, F.: Small data, big data, and human interaction. In: Rethinking the Internet of Things, pp. 77–94. Springer, Berlin (2013). doi:10.1007/978-1-4302-5741-7_5. http://link.springer.com/chapter/10.1007/978-1-4302-5741-7_5

    Google Scholar 

  353. Zhou, S., Qu, Y.R., Prasanna, V.K.: Multi-core implementation of decomposition-based packet classification algorithms. In: Parallel Computing Technologies, pp. 105–119. Springer, Berlin (2013). doi:10.1007/978-3-642-39958-9_9. http://link.springer.com/chapter/10.1007/978-3-642-39958-9_9

    Chapter  Google Scholar 

  354. Bhaumik, P., Thota, S., Zhangli, K., Chen, J., ElBakoury, H., Fang, L., Mukherjee, B.: On downstream transmissions in EPON Protocol over Coax (EPoC): an analysis of Coax framing approaches and other relevant considerations. Photonic Netw. Commun. 28(2), 178–189 (2014). doi:10.1007/s11107-014-0468-9. http://link.springer.com/article/10.1007/s11107-014-0468-9

    Article  Google Scholar 

  355. Anantha Narayanan, V., Rajeswari, A., Sureshkumar, V.: Service-adaptive fuzzy multi criteria based intelligent vertical handover decision algorithm for heterogeneous wireless networks. In: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, pp. 297–304. Springer, Berlin (2015). doi:10.1007/978-81-322-2126-5_33. http://link.springer.com/chapter/10.1007/978-81-322-2126-5_33

    Google Scholar 

  356. Wen, H., Tiwary, P.K., Le-Ngoc, T.: Wireless virtualization. In: Wireless Virtualization, pp. 41–81. Springer, Berlin (2013). doi:10.1007/978-3-319-01291-9_5. http://link.springer.com/chapter/10.1007/978-3-319-01291-9_5

    Chapter  Google Scholar 

  357. Dai, Q.-L., Shou, G.-C., Hu, Y.-H., Guo, Z.-G.: Performance improvement for applying network virtualization in fiber-wireless (FiWi) access networks. J. Zhejiang Univ. Sci. C 15(11), 1058–1070 (2014). doi:10.1631/jzus.C1400044. http://link.springer.com/article/10.1631/jzus.C1400044

    Article  Google Scholar 

  358. Hiller, W., Budich, R.: Future perspectives. In: Earth System Modelling, vol. 6, pp. 79–81. Springer, Berlin (2013). doi:10.1007/978-3-642-37244-5_8. http://link.springer.com/chapter/10.1007/978-3-642-37244-5_8

    Google Scholar 

  359. Sobeslav, V., Horalek, J., Pavlik, J.: Utilization of cloud computing in education with focus on open-source technologies. In: Proceedings of the 4th International Conference on Computer Engineering and Networks, pp. 813–819. Springer, Berlin (2015). doi:10.1007/978-3-319-11104-9_94. http://link.springer.com/chapter/10.1007/978-3-319-11104-9_94

    Chapter  Google Scholar 

  360. Evancich, N., Lu, Z., Li, J., Cheng, Y., Tuttle, J., Xie, P.: Network-wide awareness. In: Cyber Defense and Situational Awareness, pp. 63–91. Springer, Berlin (2014). doi:10.1007/978-3-319-11391-3_5. http://link.springer.com/chapter/10.1007/978-3-319-11391-3_5

    Google Scholar 

  361. Stephanakis, I.M., Chochliouros, I.P.: Multimedia content distribution over next-generation heterogeneous networks featuring a service architecture of sliced resources. In: Artificial Intelligence Applications and Innovations, pp. 300–310. Springer, Berlin (2012). doi:10.1007/978-3-642-33412-2_31. http://link.springer.com/chapter/10.1007/978-3-642-33412-2_31

    Chapter  Google Scholar 

  362. Karame, G.O.: Towards trustworthy network measurements. In: Trust and Trustworthy Computing, pp. 83–91. Springer, Berlin (2013). doi:10.1007/978-3-642-38908-5_6. http://link.springer.com/chapter/10.1007/978-3-642-38908-5_6

    Chapter  Google Scholar 

  363. Ho, Q.-D., Gao, Y., Rajalingham, G., Le-Ngoc, T.: Introduction. In: Wireless Communications Networks for the Smart Grid, pp. 1–14. Springer, Berlin (2014). doi:10.1007/978-3-319-10347-1_1. http://link.springer.com/chapter/10.1007/978-3-319-10347-1_1

    Google Scholar 

  364. Tronco, T.R., Tome, T., Rothenberg, C.E., Alberti, A.M.: New generation internet architectures: recent and ongoing projects. In: New Network Architectures, pp. 121–140. Springer, Berlin (2010). doi:10.1007/978-3-642-13247-6_6. http://link.springer.com/chapter/10.1007/978-3-642-13247-6_6

    Chapter  Google Scholar 

  365. Al-Shaer, E., Duan, Q., Jafarian, J.H.: Random host mutation for moving target defense. In: Security and Privacy in Communication Networks, pp. 310–327. Springer, Berlin (2013). doi:10.1007/978-3-642-36883-7_19. http://link.springer.com/chapter/10.1007/978-3-642-36883-7_19

    Chapter  Google Scholar 

  366. Huang, C., Zhu, S., Erbacher, R.: Toward software diversity in heterogeneous networked systems. In: Data and Applications Security and Privacy XXVIII, pp. 114–129. Springer, Berlin (2014). doi:10.1007/978-3-662-43936-4_8. http://link.springer.com/chapter/10.1007/978-3-662-43936-4_8

    Google Scholar 

  367. Clement, M.R., Volpano, D.: Programmable diagnostic network measurement with localization and traffic observation. In: Automated Security Management, pp. 153–167. Springer, Berlin (2013). doi:10.1007/978-3-319-01433-3_9. http://link.springer.com/chapter/10.1007/978-3-319-01433-3_9

    Chapter  Google Scholar 

  368. Natal, A.R., Jakab, L., Portolés, M., Ermagan, V., Natarajan, P., Maino, F., Meyer, D., Aparicio, A.C.: LISP-MN: mobile networking through LISP. Wireless Pers. Commun. 70(1), 253–266 (2013). doi:10.1007/s11277-012-0692-5. http://link.springer.com/article/10.1007/s11277-012-0692-5

    Article  Google Scholar 

  369. Qaisar, S.B., Ali, S., Felemban, E.A.: Wireless sensor networks in next generation communication infrastructure: vision and challenges. In: Computational Science and Its Applications—ICCSA 2014, pp. 790–803. Springer, Berlin (2014). doi:10.1007/978-3-319-09147-1_58. http://link.springer.com/chapter/10.1007/978-3-319-09147-1_58

    Google Scholar 

  370. Qu, Y.R., Zhou, S., Prasanna, V.K.: Packet classification on multi-core platforms. In: Handbook on Data Centers, pp. 425–447. Springer, Berlin (2015). doi:10.1007/978-1-4939-2092-1_13. http://link.springer.com/chapter/10.1007/978-1-4939-2092-1_13

    Google Scholar 

  371. Horsmanheimo, S., Maskey, N., Tuomimäki, L.: Interdependency between mobile and electricity distribution networks: outlook and prospects. In: Smart Device to Smart Device Communication, pp. 281–308. Springer, Berlin (2014). doi:10.1007/978-3-319-04963-2_10. http://link.springer.com/chapter/10.1007/978-3-319-04963-2_10

    Chapter  Google Scholar 

  372. Pignolet, Y.A., Schmid, S., Tredan, G.: Adversarial topology discovery in network virtualization environments: a threat for ISPs? Distrib. Comput. 28(2), 91–109 (2015). doi:10.1007/s00446-014-0217-4. http://link.springer.com/article/10.1007/s00446-014-0217-4

    Article  MathSciNet  MATH  Google Scholar 

  373. Kushida, K.E., Murray, J., Zysman, J.: Cloud computing: from scarcity to abundance. J. Indus. Compet. Trade 15(1), 5–19 (2015). doi:10.1007/s10842-014-0188-y. http://link.springer.com/article/10.1007/s10842-014-0188-y

    Article  Google Scholar 

  374. Lalanda, P., McCann, J.A., Diaconescu, A.: Future of autonomic computing and conclusions. In: Autonomic Computing, pp. 263–278. Springer, Berlin (2013). doi:10.1007/978-1-4471-5007-7_10. http://link.springer.com/chapter/10.1007/978-1-4471-5007-7_10

    Chapter  Google Scholar 

  375. Jiang, W., Prasanna, V.K.: Network virtualization in data centers: a data plane perspective. In: Handbook on Data Centers, pp. 327–349. Springer, Berlin (2015). doi:10.1007/978-1-4939-2092-1_10. http://link.springer.com/chapter/10.1007/978-1-4939-2092-1_10

    Google Scholar 

  376. Cohen, R., Wang, T.: Intel embedded hardware platform. In: Android Application Development for the Intel® Platform, pp. 19–46. Springer, Berlin (2014). doi:10.1007/978-1-4842-0100-8_2. http://link.springer.com/chapter/10.1007/978-1-4842-0100-8_2

    Google Scholar 

  377. Bonomi, F., Milito, R., Natarajan, P., Zhu, J.: Fog computing: a platform for internet of things and analytics. In: Big Data and Internet of Things: A Roadmap for Smart Environments, pp. 169–186. Springer, Berlin (2014). doi:10.1007/978-3-319-05029-4_7. http://link.springer.com/chapter/10.1007/978-3-319-05029-4_7

    Chapter  Google Scholar 

  378. Awad, M., Khanna, R.: Bioinspired computing: swarm intelligence. In: Efficient Learning Machines, pp. 105–125. Springer, Berlin (2015). doi:10.1007/978-1-4302-5990-9_6. http://link.springer.com/chapter/10.1007/978-1-4302-5990-9_6

    Google Scholar 

  379. Petcu, D.: Consuming resources and services from multiple clouds. J. Grid Computing. 12(2), 321–345 (2014). doi:10.1007/s10723-013-9290-3. http://link.springer.com/article/10.1007/s10723-013-9290-3

    Article  Google Scholar 

  380. Sonchack, J., Aviv, A.J.: LESS is more: host-agent based simulator for large-scale evaluation of security systems. In: Computer Security—ESORICS 2014, pp. 365–382. Springer, Berlin (2014). doi:10.1007/978-3-319-11212-1_21. http://link.springer.com/chapter/10.1007/978-3-319-11212-1_21

    Google Scholar 

  381. Dongre, D., Gourav, S., Kurhekar, M.P., Deshpande, U.A., Keskar, R.B., Radke, M.A.: Scalable cloud deployment on commodity hardware using OpenStack. In: Advanced Computing, Networking and Informatics, vol. 2, pp. 415–424. Springer, Berlin (2014). doi:10.1007/978-3-319-07350-7_46. http://link.springer.com/chapter/10.1007/978-3-319-07350-7_46

    Chapter  Google Scholar 

  382. Campbell, R.H., Montanari, M., Farivar, R.: A middleware for assured clouds. J. Internet Serv. Appl. 3(1), 87–94 (2012). doi:10.1007/s13174-011-0044-9. http://link.springer.com/article/10.1007/s13174-011-0044-9

    Article  Google Scholar 

  383. Lin, G., Liu, E.: High performance network architectures for data intensive computing. In: Handbook of Data Intensive Computing, pp. 3–23. Springer, Berlin (2011). doi:10.1007/978-1-4614-1415-5_1. http://link.springer.com/chapter/10.1007/978-1-4614-1415-5_1

    Chapter  Google Scholar 

  384. Janczukowicz, E., Tuffin, S., Braud, A., Bouabdallah, A., Fromentoux, G., Bonnin, J.-M.: Approaches for offering QoS and specialized traffic treatment for WebRTC. In: Advances in Communication Networking, pp. 59–69. Springer, Berlin (2014). doi:10.1007/978-3-319-13488-8_6. http://link.springer.com/chapter/10.1007/978-3-319-13488-8_6

    Google Scholar 

  385. Hahn, W., Sanneck, H.: Centralized GW control and IP address management for 3GPP networks. In: Mobile Networks and Management, pp. 13–27. Springer, Berlin (2013). doi:10.1007/978-3-642-37935-2_2. http://link.springer.com/chapter/10.1007/978-3-642-37935-2_2

    Chapter  Google Scholar 

  386. Datenschutz und Datensicherheit—DuD. 39(3), 202–207 (2015). doi:10.1007/s11623-015-0394-8. http://link.springer.com/article/10.1007/s11623-015-0394-8

    Google Scholar 

  387. Zhou, S., Qu, Y.R., Prasanna, V.K.: Multi-core implementation of decomposition-based packet classification algorithms. J. Supercomput. 69(1), 34–42 (2014). doi:10.1007/s11227-014-1205-y. http://link.springer.com/article/10.1007/s11227-014-1205-y

    Article  Google Scholar 

  388. Waschke, M.: Network and internet standards. In: Cloud Standards, pp. 199–240. Springer, Berlin (2012). doi:10.1007/978-1-4302-4111-9_9. http://link.springer.com/chapter/10.1007/978-1-4302-4111-9_9

    Chapter  Google Scholar 

  389. Hwang, H., Ata, S., Murata, M.: Resource name-based routing in the network layer. J. Netw. Syst. Manage. 22(1), 1–22 (2014). doi:10.1007/s10922-012-9257-x. http://link.springer.com/article/10.1007/s10922-012-9257-x

    Article  Google Scholar 

  390. Simmons, J.M.: Introduction to optical networks. In: Optical Network Design and Planning, pp. 1–23. Springer, Berlin (2014). doi:10.1007/978-3-319-05227-4_1. http://link.springer.com/chapter/10.1007/978-3-319-05227-4_1

    Chapter  Google Scholar 

  391. Craus, M., Butincu, C.: The potential of cloud computing for analysis and finding solutions in disasters. In: Improving Disaster Resilience and Mitigation—IT Means and Tools, pp. 239–252. Springer, Berlin (2014). doi:10.1007/978-94-017-9136-6_15. http://link.springer.com/chapter/10.1007/978-94-017-9136-6_15

    Google Scholar 

  392. Ge, J., Wang, S., Wu, Y., Tang, H., Yuepeng, E.: Performance improvement for source mobility in named data networking based on global—local FIB updates. Peer-to-Peer Network. Appl. (2015). doi:10.1007/s12083-015-0353-z. http://link.springer.com/article/10.1007/s12083-015-0353-z

    Google Scholar 

  393. Lee, J., Park, M.-W., Chung, T.-M.: Path information based packet verification for authentication of SDN network manager. In: Computer Science and Its Applications, pp. 861–866. Springer, Berlin (2015). doi:10.1007/978-3-662-45402-2_122. http://link.springer.com/chapter/10.1007/978-3-662-45402-2_122

    Google Scholar 

  394. Martinez-Julia, P., Skarmeta, A.F., Galis, A.: Towards a secure network virtualization architecture for the future internet. In: The Future Internet, pp. 141–152. Springer, Berlin (2013). doi:10.1007/978-3-642-38082-2_12. http://link.springer.com/chapter/10.1007/978-3-642-38082-2_12

    Chapter  Google Scholar 

  395. Cerroni, W., Raffaelli, C.: Analytical model of quality of service scheduling for optical aggregation in data centers. Photonic Netw. Commun. 28(3), 264–275 (2014). doi:10.1007/s11107-014-0449-z. http://link.springer.com/article/10.1007/s11107-014-0449-z

    Article  Google Scholar 

  396. Ravi, A., Peddoju, S.K.: Handoff strategy for improving energy efficiency and cloud service availability for mobile devices. Wireless Pers. Commun. 81(1), 101–132 (2015). doi:10.1007/s11277-014-2119-y. http://link.springer.com/article/10.1007/s11277-014-2119-y

    Article  Google Scholar 

  397. Ös, M.D., Bressan, G.: A community cloud for a real-time financial application—requirements, architecture and mechanisms. In: Algorithms and Architectures for Parallel Processing, pp. 364–377. Springer, Berlin (2014). doi:10.1007/978-3-319-11197-1_28. http://link.springer.com/chapter/10.1007/978-3-319-11197-1_28

    Google Scholar 

  398. Ahamed, S.V., Lawrence, V.B.: Recent American intelligent networks. In: Intelligent Broadband Multimedia Networks, pp. 152–183. Springer, Berlin (1997). doi:10.1007/978-1-4615-6341-9_6. http://link.springer.com/chapter/10.1007/978-1-4615-6341-9_6

    Chapter  Google Scholar 

  399. Aßmann, J., Kiontke, A., Roller, S.: Requirements for modern network infrastructures. In: Sustained Simulation Performance 2014, pp. 141–150. Springer, Berlin (2015). doi:10.1007/978-3-319-10626-7_12. http://link.springer.com/chapter/10.1007/978-3-319-10626-7_12

    Google Scholar 

  400. Heck, A.: S. In: StarBriefs Plus, pp. 855–957. Springer, Berlin (2004). doi:10.1007/978-0-306-48603-6_19. http://link.springer.com/chapter/10.1007/978-0-306-48603-6_19

    Google Scholar 

  401. Rost, M., Schmid, S.: VirtuCast: multicast and aggregation with in-network processing. In: Principles of Distributed Systems, pp. 221–235. Springer, Berlin (2013). doi:10.1007/978-3-319-03850-6_16. http://link.springer.com/chapter/10.1007/978-3-319-03850-6_16

    Chapter  Google Scholar 

  402. Terplan, K.: Integrated network management. In: Network Management and Control, pp. 31–57. Springer, Berlin (1990). doi:10.1007/978-1-4613-1471-4_4. http://link.springer.com/chapter/10.1007/978-1-4613-1471-4_4

    Chapter  Google Scholar 

  403. Anderson, T., Birman, K., Broberg, R., Caesar, M., Comer, D., Cotton, C., Freedman, M.J., Haeberlen, A., Ives, Z.G., Krishnamurthy, A., Lehr, W., Loo, B.T., Mazières, D., Nicolosi, A., Smith, J.M., Stoica, I.: The NEBULA future internet architecture. In: The Future Internet, pp. 16–26. Springer, Berlin (2013). doi:10.1007/978-3-642-38082-2_2. http://link.springer.com/chapter/10.1007/978-3-642-38082-2_2

    Chapter  Google Scholar 

  404. Szymanski, T.H.: Impact of future trends on exascale grid and cloud computing. In: Supercomputing, pp. 215–231. Springer, Berlin (2014). doi:10.1007/978-3-319-07518-1_14. http://link.springer.com/chapter/10.1007/978-3-319-07518-1_14

    Google Scholar 

  405. Liu, Y., Wu, J.P., Zhang, Z., Ke, X.: Research achievements on the new generation Internet architecture and protocols. Sci. China Inform. Sci. 56(11), 1–25 (2013). doi:10.1007/s11432-013-5021-4. http://link.springer.com/article/10.1007/s11432-013-5021-4

    Google Scholar 

  406. Budka, K.C., Deshpande, J.G., Thottan, M.: Future of smart grid communication networks. In: Communication Networks for Smart Grids, pp. 325–330. Springer, Berlin (2014). doi:10.1007/978-1-4471-6302-2_12. http://link.springer.com/chapter/10.1007/978-1-4471-6302-2_12

    Chapter  Google Scholar 

  407. Baby Nirmala, M.: Cloud based big data analytics: WAN optimization techniques and solutions. In: Computational Intelligence for Big Data Analysis, pp. 237–254. Springer, Berlin (2015). doi:10.1007/978-3-319-16598-1_11. http://link.springer.com/chapter/10.1007/978-3-319-16598-1_11

    Google Scholar 

  408. Xu, Z.-W.: Cloud-sea computing systems: towards thousand-fold improvement in performance per watt for the coming zettabyte era. J. Comput. Sci. Technol. 29(2), 177–181 (2014). doi:10.1007/s11390-014-1420-2. http://link.springer.com/article/10.1007/s11390-014-1420-2

    Article  Google Scholar 

  409. Ali, S.: Virtualization with KVM. In: Practical Linux Infrastructure, pp. 53–80. Springer, Berlin (2015). doi:10.1007/978-1-4842-0511-2_3. http://link.springer.com/chapter/10.1007/978-1-4842-0511-2_3

    Google Scholar 

  410. Xu, K., Zhu, M., Hu, G.W., Liang, Z., Zhong, Y.F., Liu, Y., Wu, J.P., Wang, N.: Towards evolvable Internet architecture-design constraints and models analysis. Sci. China Inform. Sci. 57(11), 1–24 (2014). doi:10.1007/s11432-014-5134-4. http://link.springer.com/article/10.1007/s11432-014-5134-4

    Article  Google Scholar 

  411. Heck, A.: S. In: StarBriefs 2001, pp. 619–693. Springer, Berlin (2001). doi:10.1007/978-94-011-4351-6_19. http://link.springer.com/chapter/10.1007/978-94-011-4351-6_19

    Google Scholar 

  412. Geller, H.: Telecommunications policy issues: the new money delivery modes. In: Electronic Funds Transfers and Payments: The Public Policy Issues, pp. 63–78. Springer, Berlin (1987). doi:10.1007/978-94-015-7738-0_4. http://link.springer.com/chapter/10.1007/978-94-015-7738-0_4

    Chapter  Google Scholar 

  413. Ahmedin, A., Pandit, K., Ghosal, D., Ghosh, A.: Exploiting scalable video coding for content aware downlink video delivery over LTE. In: Distributed Computing and Networking, pp. 423–437. Springer, Berlin (2014). doi:10.1007/978-3-642-45249-9_28. http://link.springer.com/chapter/10.1007/978-3-642-45249-9_28

    Chapter  Google Scholar 

  414. Su, G., Hidell, M., Abrahamsson, H., Ahlgren, B., Li, D., Sjödin, P., Tanyingyong, V., Ke, X.: Resource management in radio access and IP-based core networks for IMT advanced and beyond. Sci. China Inform. Sci. 56(2), 1–16 (2013). doi:10.1007/s11432-012-4777-2. http://link.springer.com/article/10.1007/s11432-012-4777-2

    Article  MathSciNet  Google Scholar 

  415. Paolucci, F., Castro, A., Fresi, F., Imran, M., Giorgetti, A., Bhownik, B.B., Berrettini, G., Meloni, G., Cugini, F., Velasco, L., Potì, L., Castoldi, P.: Active PCE demonstration performing elastic operations and hitless defragmentation in flexible grid optical networks. Photonic Netw. Commun. 29(1), 57–66 (2015). doi:10.1007/s11107-014-0464-0. http://link.springer.com/article/10.1007/s11107-014-0464-0

    Article  Google Scholar 

  416. Kliem, A., Renner, T.: Towards on-demand resource provisioning for IoT environments. In: Intelligent Information and Database Systems, pp. 484–493. Springer, Berlin (2015). doi:10.1007/978-3-319-15705-4_47. http://link.springer.com/chapter/10.1007/978-3-319-15705-4_47

    Google Scholar 

  417. Bodei, C., Brodo, L., Bruni, R.: Open multiparty interaction. In: Recent Trends in Algebraic Development Techniques, pp. 1–23. Springer, Berlin (2013). doi:10.1007/978-3-642-37635-1_1. http://link.springer.com/chapter/10.1007/978-3-642-37635-1_1

    Chapter  Google Scholar 

  418. Zhu, J.: Computing styles. In: China Cloud Rising, pp. 41–56. Springer, Berlin (2014). doi:10.1007/978-3-642-53745-5_6. http://link.springer.com/chapter/10.1007/978-3-642-53745-5_6

    Chapter  Google Scholar 

  419. Kannan, K., Banerjee, S.: Compact TCAM: flow entry compaction in TCAM for power aware SDN. In: Distributed Computing and Networking, pp. 439–444. Springer, Berlin (2013). doi:10.1007/978-3-642-35668-1_32. http://link.springer.com/chapter/10.1007/978-3-642-35668-1_32

    Chapter  Google Scholar 

  420. Rothenberg, C.E.: Re-architected cloud data center networks and their impact on the future internet. In: New Network Architectures, pp. 179–187. Springer, Berlin (2010). doi:10.1007/978-3-642-13247-6_10. http://link.springer.com/chapter/10.1007/978-3-642-13247-6_10

    Chapter  Google Scholar 

  421. Ahamed, S.V., Lawrence, V.B.: Networks and the information society. In: Intelligent Broadband Multimedia Networks, pp. 60–93. Springer, Berlin (1997). doi:10.1007/978-1-4615-6341-9_3. http://link.springer.com/chapter/10.1007/978-1-4615-6341-9_3

    Chapter  Google Scholar 

  422. Chatterjee, P., Ghosh, U., Sengupta, I., Ghosh, S.K.: A trust enhanced secure clustering framework for wireless ad hoc networks. Wireless Netw. 20(7), 1669–1684 (2014). doi:10.1007/s11276-014-0701-6. http://link.springer.com/article/10.1007/s11276-014-0701-6

    Article  Google Scholar 

  423. Detti, A., Salsano, S., Melazzi, N.B.: The network level (CONET). In: Enhancing the Internet with the CONVERGENCE System, pp. 49–72. Springer, Berlin (2014). doi:10.1007/978-1-4471-5373-3_3. http://link.springer.com/chapter/10.1007/978-1-4471-5373-3_3

    Chapter  Google Scholar 

  424. Monserrat, J.F., Mange, G., Braun, V., Tullberg, H., Zimmermann, G., Bulakci, Ö.: METIS research advances towards the 5G mobile and wireless system definition. EURASIP J. Wireless Commun. Network. (2015). doi:10.1186/s13638-015-0302-9. http://link.springer.com/article/10.1186/s13638-015-0302-9

    Google Scholar 

  425. Fragkiadakis, A., Askoxylakis, I., Chatziadam, P.: Denial-of-service attacks in wireless networks using off-the-shelf hardware. In: Distributed, Ambient, and Pervasive Interactions, pp. 427–438. Springer, Berlin (2014). doi:10.1007/978-3-319-07788-8_40. http://link.springer.com/chapter/10.1007/978-3-319-07788-8_40

    Chapter  Google Scholar 

  426. Joel Jr., A.E.: Communication switching architectures for business, industry, and government. In: Fundamentals of Digital Switching, pp. 429–446. Springer, Berlin (1990). doi:10.1007/978-1-4684-9880-6_11. http://link.springer.com/chapter/10.1007/978-1-4684-9880-6_11

    Chapter  Google Scholar 

  427. Vlietstra, J.: S. In: Dictionary of Acronyms and Technical Abbreviations, pp. 538–604. Springer, Berlin (1997). doi:10.1007/978-1-4471-3396-4_19. http://link.springer.com/chapter/10.1007/978-1-4471-3396-4_19

    Google Scholar 

  428. Klein, D., Zinner, T., Borchert, K., Lange, S., Singeorzan, V., Schmid, M.: Evaluation of video quality monitoring based on pre-computed frame distortions. In: Advances in Communication Networking, pp. 100–111. Springer, Berlin (2013). doi:10.1007/978-3-642-40552-5_10. http://link.springer.com/chapter/10.1007/978-3-642-40552-5_10

    Chapter  Google Scholar 

  429. Vlietstra, J.: S. In: Dictionary of Acronyms and Technical Abbreviations, pp. 545–610. Springer, Berlin (2001). doi:10.1007/978-1-4471-0263-2_19. http://link.springer.com/chapter/10.1007/978-1-4471-0263-2_19

    Google Scholar 

  430. Hong, J.W.-K., Yuan-Kuang, T., Hong, C.S., Tseng, S.-S., Kiriha, Y., Chao, H.-C., Zhanikeev, M., Song, W.-C.: Managing clouds, smart networks and services: a report on APNOMS 2011. J. Netw. Syst. Manage. 20(1), 134–142 (2012). doi:10.1007/s10922-011-9221-1. http://link.springer.com/article/10.1007/s10922-011-9221-1

    Article  Google Scholar 

  431. Fang, Y.-C., Gao, Y., Stap, C.: Future enterprise computing looking into 2020. In: Frontier and Innovation in Future Computing and Communications, pp. 127–134. Springer, Berlin (2014). doi:10.1007/978-94-017-8798-7_16. http://link.springer.com/chapter/10.1007/978-94-017-8798-7_16

    Chapter  Google Scholar 

  432. Kannan, K., Banerjee, S.: FlowMaster: early eviction of dead flow on SDN switches. In: Distributed Computing and Networking, pp. 484–498. Springer, Berlin (2014). doi:10.1007/978-3-642-45249-9_32. http://link.springer.com/chapter/10.1007/978-3-642-45249-9_32

    Chapter  Google Scholar 

  433. Tong, X.C.: Perspectives and future trends. In: Advanced Materials for Integrated Optical Waveguides, pp. 509–543. Springer, Berlin (2014). doi:10.1007/978-3-319-01550-7_12. http://link.springer.com/chapter/10.1007/978-3-319-01550-7_12

    Chapter  Google Scholar 

  434. Zhang, S., Malik, S., McGeer, R.: Verification of computer switching networks: an overview. In: Automated Technology for Verification and Analysis, pp. 1–16. Springer, Berlin (2012). doi:10.1007/978-3-642-33386-6_1. http://link.springer.com/chapter/10.1007/978-3-642-33386-6_1

    Chapter  Google Scholar 

  435. daCosta, F.: It’s different out here. In: Rethinking the Internet of Things, pp. 1–21. Springer, Berlin (2013). doi:10.1007/978-1-4302-5741-7_1. http://link.springer.com/chapter/10.1007/978-1-4302-5741-7_1

    Chapter  Google Scholar 

  436. Elmallah, E.S., Acharya, H.B., Gouda, M.G.: Incremental verification of computing policies. In: Stabilization, Safety, and Security of Distributed Systems, pp. 226–236. Springer, Berlin (2014). doi:10.1007/978-3-319-11764-5_16. http://link.springer.com/chapter/10.1007/978-3-319-11764-5_16

    Google Scholar 

  437. Huang, W.: The development of cloud computing in pacific rim. In: Web Services and Formal Methods, pp. 3–12. Springer, Berlin (2014). doi:10.1007/978-3-319-08260-8_1. http://link.springer.com/chapter/10.1007/978-3-319-08260-8_1

    Google Scholar 

  438. Astorga, J., Jacob, E., Toledo, N., Aguado, M., Higuero, M.: A lossy channel aware parameterisation of a novel security protocol for wireless IP-enabled sensors. Wireless Netw. 21(4), 1289–1308 (2015). doi:10.1007/s11276-014-0854-3. http://link.springer.com/article/10.1007/s11276-014-0854-3

    Article  Google Scholar 

  439. Antonenko, V.A., Smelyanskiy, R.L.: Simulation of malicious activity in wide area networks. Program. Comput. Softw. 39(1), 25–33 (2013). doi:10.1134/S0361768813010027. http://link.springer.com/article/10.1134/S0361768813010027

    Article  MathSciNet  MATH  Google Scholar 

  440. Corradi, A., Fanelli, M., Foschini, L.: Management infrastructures for power-efficient cloud computing architectures. In: Cloud Computing, pp. 133–152. Springer, Berlin (2013). doi:10.1007/978-1-4471-5107-4_7. http://link.springer.com/chapter/10.1007/978-1-4471-5107-4_7

    Chapter  Google Scholar 

  441. Kumaran, S.: A perspective of the cellular network of the future: cloud-RAN. In: Afro-European Conference for Industrial Advancement, pp. 27–41. Springer, Berlin (2015). doi:10.1007/978-3-319-13572-4_3. http://link.springer.com/chapter/10.1007/978-3-319-13572-4_3

    Google Scholar 

  442. Liang, J., Lin, Z., Ma, Y.: OF-NEDL: an OpenFlow networking experiment description language based on XML. In: Web Information Systems and Mining, pp. 686–697. Springer, Berlin (2012). doi:10.1007/978-3-642-33469-6_85. http://link.springer.com/chapter/10.1007/978-3-642-33469-6_85

    Chapter  Google Scholar 

  443. Ardagna, C.A., Damiani, E.: Network and storage latency attacks to online trading protocols in the cloud. In: On the Move to Meaningful Internet Systems: OTM 2014 Workshops, pp. 192–201. Springer, Berlin (2014). doi:10.1007/978-3-662-45550-0_20. http://link.springer.com/chapter/10.1007/978-3-662-45550-0_20

    Google Scholar 

  444. Nikolik, D.: Wide area networks. In: A Manager’s Primer on e-Networking, pp. 163–180. Springer, Berlin (2003). doi:10.1007/978-94-007-0862-4_11. http://link.springer.com/chapter/10.1007/978-94-007-0862-4_11

    Chapter  Google Scholar 

  445. Industriegipfel Feldafing—System Leadership 2030“—ein Resümee erster Strategiegespräche zu Industrie 4.0. Informatik-Spektrum. 37(1), 54–72 (2014). doi:10.1007/s00287-013-0763-3. http://link.springer.com/article/10.1007/s00287-013-0763-3

    Google Scholar 

  446. Yu, C., Lumezanu, C., Zhang, Y., Singh, V., Jiang, G., Madhyastha, H.V.: FlowSense: monitoring network utilization with zero measurement cost. In: Passive and Active Measurement, pp. 31–41. Springer, Berlin (2013). doi:10.1007/978-3-642-36516-4_4. http://link.springer.com/chapter/10.1007/978-3-642-36516-4_4

    Chapter  Google Scholar 

  447. Shu, L., Zhang, Y., Chen, X., Wang, S.: Editorial for special issue on industrial networks and intelligent systems. Mob. Netw. Appl. 20(2), 121–123 (2015). doi:10.1007/s11036-015-0594-3. http://link.springer.com/article/10.1007/s11036-015-0594-3

    Article  Google Scholar 

  448. Gifre, L., Paolucci, F., Aguado, A., Casellas, R., Castro, A., Cugini, F., Castoldi, P., Velasco, L., López, V.: Experimental assessment of in-operation spectrum defragmentation. Photonic Netw. Commun. 27(3), 128–140 (2014). doi:10.1007/s11107-014-0433-7. http://link.springer.com/article/10.1007/s11107-014-0433-7

    Article  Google Scholar 

  449. Ahamed, S.V., Lawrence, V.B.: Optical lightwave systems in existing networks. In: Design and Engineering of Intelligent Communication Systems, pp. 559–593. Springer, Berlin (1997). doi:10.1007/978-1-4615-6291-7_17. http://link.springer.com/chapter/10.1007/978-1-4615-6291-7_17

    Chapter  Google Scholar 

  450. Stiller, B., Hausheer, D., Hoßfeld, T.: Towards a socially-aware management of new overlay application traffic combined with energy efficiency in the internet (SmartenIT). In: The Future Internet, pp. 3–15. Springer, Berlin (2013). doi:10.1007/978-3-642-38082-2_1. http://link.springer.com/chapter/10.1007/978-3-642-38082-2_1

    Chapter  Google Scholar 

  451. Ahamed, S.V., Lawrence, V.B.: Current digital networks. In: Design and Engineering of Intelligent Communication Systems, pp. 85–122. Springer, Berlin (1997). doi:10.1007/978-1-4615-6291-7_4. http://link.springer.com/chapter/10.1007/978-1-4615-6291-7_4

    Chapter  Google Scholar 

  452. Togawa, S., Kanenishi, K.: Private cloud collaboration framework for e-learning environment for disaster recovery using smartphone alert notification. In: Human Interface and the Management of Information. Information and Knowledge in Applications and Services, pp. 118–126. Springer, Berlin (2014). doi:10.1007/978-3-319-07863-2_13. http://link.springer.com/chapter/10.1007/978-3-319-07863-2_13

    Google Scholar 

  453. Ahamed, S.V., Lawrence, V.B.: Advanced intelligent networks (AINs). In: Intelligent Broadband Multimedia Networks, pp. 318–336. Springer, Berlin (1997). doi:10.1007/978-1-4615-6341-9_13. http://link.springer.com/chapter/10.1007/978-1-4615-6341-9_13

    Chapter  Google Scholar 

  454. Togawa, S., Kanenishi, K.: Private cloud cooperation framework for reducing the earthquake damage on e-learning environment. In: Human-Computer Interaction. Applications and Services, pp. 503–510. Springer, Berlin (2013). doi:10.1007/978-3-642-39262-7_57. http://link.springer.com/chapter/10.1007/978-3-642-39262-7_57

    Chapter  Google Scholar 

  455. Wagh, A., Hou, Y., Qiao, C., Zhang, L., Xu, L., Sadek, A., Hulme, K., Wu, C., Xu, H.-L., Huang, L.-S.: Emerging applications for cyber transportation systems. J. Comput. Sci. Technol. 29(4), 562–575 (2014). doi:10.1007/s11390-014-1450-9. http://link.springer.com/article/10.1007/s11390-014-1450-9

    Article  Google Scholar 

  456. Santos, M.A.S., Porras, D.E.T., Silveira, R.M., Margi, C.B.: Multipath source routing strategies for video transmission in ad hoc wireless networks. Wireless Netw. 21(3), 859–869 (2015). doi:10.1007/s11276-014-0823-x. http://link.springer.com/article/10.1007/s11276-014-0823-x

    Article  Google Scholar 

  457. Chowdhury, S.R., Roy, A.R., Shaikh, M., Daudjee, K.: A taxonomy of decentralized online social networks. Peer-to-Peer Network. Appl. 8(3), 367–383 (2015). doi:10.1007/s12083-014-0258-2. http://link.springer.com/article/10.1007/s12083-014-0258-2

    Article  Google Scholar 

  458. Yoon, S., Lee, S.S., Kim, S.-H.: Robust mutual trust architecture for safety critical service in heterogeneous mobile network environment. Telecommun. Syst. (2015). doi:10.1007/s11235-015-0029-2. http://link.springer.com/article/10.1007/s11235-015-0029-2

    Google Scholar 

  459. Said Seddiki, M., Frikha, M., Song, Y.-Q.: A non-cooperative game-theoretic framework for resource allocation in network virtualization. Telecommun. Syst. (2015). doi:10.1007/s11235-015-9995-7. http://link.springer.com/article/10.1007/s11235-015-9995-7

    Google Scholar 

  460. Zinner, T., Hoßfeld, T., Fiedler, M., Liers, F., Volkert, T., Khondoker, R., Schatz, R.: Requirement driven prospects for realizing user-centric network orchestration. Multimedia Tools Appl. 74(2), 413–437 (2015). doi:10.1007/s11042-014-2072-5. http://link.springer.com/article/10.1007/s11042-014-2072-5

    Article  Google Scholar 

  461. Zhao, D., Wu, C., Hu, X., Liu, H.: LSC2: an extended link state protocol with centralized control. Peer-to-Peer Network. Appl. (2013). doi:10.1007/s12083-013-0226-2. http://link.springer.com/article/10.1007/s12083-013-0226-2

    Google Scholar 

  462. Kitamura, M., Kimiyama, H., Ogura, T., Fujii, T.: A basic study on high bandwidth streaming in realtime over multipath using LDPC-IRA codes. In: Internet and Distributed Computing Systems, pp. 217–226. Springer, Berlin (2014). doi:10.1007/978-3-319-11692-1_19. http://link.springer.com/chapter/10.1007/978-3-319-11692-1_19

    Google Scholar 

  463. Bayzelon, G., Yang, S., Xu, M., Li, Q.: Multi-dimensional forwarding tables. In: Frontiers in Internet Technologies, pp. 68–79. Springer, Berlin (2015). doi:10.1007/978-3-662-46826-5_6. http://link.springer.com/chapter/10.1007/978-3-662-46826-5_6

    Google Scholar 

  464. Aguiar, E., Riker, A., Cerqueira, E., Antônio Abelém, M.M., Braun, T., Curado, M., Zeadally, S.: A real-time video quality estimator for emerging wireless multimedia systems. Wireless Netw. 20(7), 1759–1776 (2014). doi:10.1007/s11276-014-0709-y. http://link.springer.com/article/10.1007/s11276-014-0709-y

    Article  Google Scholar 

  465. Sousa, B., Marques, C., Palma, D., Gonçalves, J., Simões, P., Bohnert, T., Cordeiro, L.: Towards a high performance DNSaaS deployment. In: Mobile Networks and Management, pp. 77–90. Springer, Berlin (2015). doi:10.1007/978-3-319-16292-8_6. http://link.springer.com/chapter/10.1007/978-3-319-16292-8_6

    Google Scholar 

  466. Trestian, R., Ormond, O., Muntean, G.-M.: Performance evaluation of MADM-based methods for network selection in a multimedia wireless environment. Wireless Netw. (2014). doi:10.1007/s11276-014-0882-z. http://link.springer.com/article/10.1007/s11276-014-0882-z

    Google Scholar 

  467. Haileselassie Hagos, D.: The performance of network-controlled mobile data offloading from LTE to WiFi networks. Telecommun. Syst. (2015). doi:10.1007/s11235-015-0061-2. http://link.springer.com/article/10.1007/s11235-015-0061-2

    Google Scholar 

  468. Ju, H., Hong, C.S., Takano, M., Yoo, J.-H., Chang, K.-Y., Yoshihara, K., Jeng, J.-Y.: Management in the big data & IoT era: a report on APNOMS 2012. J. Netw. Syst. Manage. 21(3), 517–524 (2013). doi:10.1007/s10922-013-9270-8. http://link.springer.com/article/10.1007/s10922-013-9270-8

    Article  Google Scholar 

  469. Al-Maqri, M.A., Mohamed, O., Mohd Ali, B., Mohd Hanapi, Z.: Adaptive multi-polling scheduler for QoS support of video transmission in IEEE 802.11e WLANs. Telecommun. Syst. (2015). doi:10.1007/s11235-015-0020-y. http://link.springer.com/article/10.1007/s11235-015-0020-y

    Google Scholar 

  470. Sedef Savas, S., Ferhat, D., Farhan Habib, M., Tornatore, M., Mukherjee, B.: Disaster-aware service provisioning with manycasting in cloud networks. Photonic Netw. Commun. 28(2), 123–134 (2014). doi:10.1007/s11107-014-0457-z. http://link.springer.com/article/10.1007/s11107-014-0457-z

    Article  Google Scholar 

  471. Li, L., Xu, X., Wang, J., Wang, W.: DS2: a DHT-based substrate for distributed services. Peer-to-Peer Network. Appl. 6(4), 380–396 (2013). doi:10.1007/s12083-013-0228-0. http://link.springer.com/article/10.1007/s12083-013-0228-0

    Article  Google Scholar 

  472. Jiang, J.-R., Wu, J.-W., Fan, C.-W., Jie-Yi, W.: Immersive voice communication for massively multiplayer online games. Peer-to-Peer Network. Appl. (2014). doi:10.1007/s12083-014-0312-0. http://link.springer.com/article/10.1007/s12083-014-0312-0

    Google Scholar 

  473. Tarasiuk, H., Hanczewski, S., Kaliszan, A., Szuman, R., Ogrodowczyk, Ł., Olszewski, I., Giertych, M., Wiśniewski, P.: The IPv6 QoS system implementation in virtual infrastructure. Telecommun. Syst. (2015). doi:10.1007/s11235-015-9996-6. http://link.springer.com/article/10.1007/s11235-015-9996-6

    Google Scholar 

  474. Abdeljaouad, I., Karmouch, A.: A game-theoretic approach for dynamic and adaptive managers selection in service specific overlay networks. J. Netw. Syst. Manage. (2014). doi:10.1007/s10922-014-9316-6. http://link.springer.com/article/10.1007/s10922-014-9316-6

    Google Scholar 

  475. Liu, Y., Chen, W.: Multicast storage and forwarding method for distributed router. In: Frontiers in Internet Technologies, pp. 106–117. Springer, Berlin (2015). doi:10.1007/978-3-662-46826-5_9. http://link.springer.com/chapter/10.1007/978-3-662-46826-5_9

    Google Scholar 

  476. Javaid, N., Ahmad, A., Khan, Y., Khan, Z.A., Alghamdi, T.A.: A relay based routing protocol for wireless in-body sensor networks. Wireless Pers. Commun. 80(3), 1063–1078 (2015). doi:10.1007/s11277-014-2071-x. http://link.springer.com/article/10.1007/s11277-014-2071-x

    Article  Google Scholar 

  477. Li, J., Zeng, W., Arora, A.: The configuration space of duty-cycled CSMA-based wireless MACs. Wireless Netw. 20(8), 2561–2579 (2014). doi:10.1007/s11276-014-0750-x. http://link.springer.com/article/10.1007/s11276-014-0750-x

    Article  Google Scholar 

  478. Alsmadi, I.: the integration of access control levels based on SDN. Int. J. High Perform. Comput. Network. (2016). doi:10.1504/IJHPCN.2016.077820

    Google Scholar 

  479. Aleroud, A., Alsmadi, I.: Identifying DoS attacks on software defined networks: a relation context approach. NOMS (2016)

    Google Scholar 

  480. Alsmadi, I., Munakami, M., Xu, D.: Model-based testing of SDN firewalls: a case study. In: Proceedings of The Second International Conference on Trustworthy Systems and Their Applications, (TSA’15), Taiwan, July 2015

    Google Scholar 

  481. Alsmadi, I., Xu, D.: Security of software defined networks: a survey. Comput. Secur. 53, 79–108 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Izzat M. Alsmadi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Alsmadi, I.M., Zarour, M. (2017). Empirical Evidences in Software-Defined Network Security: A Systematic Literature Review. In: Alsmadi, I., Karabatis, G., Aleroud, A. (eds) Information Fusion for Cyber-Security Analytics. Studies in Computational Intelligence, vol 691. Springer, Cham. https://doi.org/10.1007/978-3-319-44257-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44257-0_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44256-3

  • Online ISBN: 978-3-319-44257-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics