Abstract
Nowadays, the term software-defined networking (SDN) becomes very popular. It is an approach that decouples the “control plane” and the “data plane” in switches to allow more programmable control of network traffic flows. Currently, several efforts are under way to thoroughly study and deploy SDN, as well as create standards that regulate the use of SDN. Since SDN is considered relatively a new discipline, a very little empirical literature has been aggregated in this field. The objective of this study is to aggregate and synthesize the empirical evidence from literature of SDN security to report the trends, patterns, and current status of the field. A systematic literature review (SLR) has been conducted to synthesize the empirical work in SDN.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hu, H., Han, W., Ahn, G.-J., Zhao, Z.: FLOWGUARD: building robust firewalls for software-defined networks. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Hu, C., Liu, B., Zhao, H., Chen, K., Chen, Y., Yu, C., Hao, W.: Discount counting for fast flow statistics on flow size and flow volume. IEEE/ACM Trans. Networking 22(3), 970–981 (2014)
Kreutz, D., Ramos, F.M.V., Verissimo, P.: Towards secure and dependable software-defined networks. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Scott-Hayward, S., O’Callaghan, G., Sezer, S.: SDN security: a survey in 2013 I.E. SDN for future networks and services (SDN4FNS), pp. 1–7. Institute of Electrical and Electronics Engineers (IEEE) (2013)
Kloeti, R., Kotronis, V., Smith, P.: OpenFlow: a security analysis. In: Proceedings of the 8th Workshop on Secure Network Protocols (NPSec), part of IEEE ICNP, Göttingen, Germany, October 2013
Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, ACM, 2013, pp. 55–60, HotSDN’13, 16 August 2013, Hong Kong, China
Kreutz, D., Ramos, F.M.V., Verissimo, P., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey, June 2014
Hu, F., Hao, Q., Bao, K.: A survey on software-defined network (SDN) and OpenFlow: from concept to implementation. IEEE Commun. Surv. Tutor. 16(4), 2181–2206 (2014)
Nunes, B., Mendonca, M., Nguyen, X.-N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, future of programmable networks. IEEE Commun. Surv. Tutor. 16(3), 1617–1634 (2014)
Xia, W., Wen, Y., Foh, C.H., Niyato, D., Xie, H.: A survey on software-defined networking. IEEE Commun. Surv. Tutor. 99, 1 (2014)
Jarraya, Y., Madi, T., Debbabi, M.: A survey and a layered taxonomy of software-defined networking. IEEE Commun. Surv. Tutor. 16(1), 1955–1980 (2014)
Lara, A., Kolasani, A., Ramamurthy, B.: Network innovation using OpenFlow: a survey. IEEE Commun. Surv. Tutor. 16(1), 493–512 (2014)
Lara, A., Ramamurthy, B., Nagaraja, K., Krishnamoorthy, A., Raychaudhuri, D.: Using OpenFlow to provide cut-through switching in MobilityFirst. Photonic Netw. Commun. 28(2), 165–177 (2014). doi:10.1007/s11107-014-0461-3. http://link.springer.com/article/10.1007/s11107-014-0461-3
Feamster, N., Rexford, J., Zegura, E.: The road to SDN. Queue 11(12), 20–32 (2013)
Feamster, N., Rexford, J., Zegura, E.: The road to SDN: an intellectual history of programmable networks. ACM Queue 11, 12 (2013)
Li, H., Hu, C., Hong, J., Chen, X., Jiang, Y.: Parsing application layer protocol with commodity hardware for SDN. In: ANCS ’15: Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for Networking and Communications Systems, May 2015
Qu, Y.R., Zhang, H.H., Zhou, S., Prasanna, V.K.: Optimizing many-field packet classification on FPGA, multi-core general purpose processor, and GPU. In: ANCS ’15: Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for Networking and Communications Systems, May 2015
Garzarella, S., Lettieri, G., Rizzo, L.: Virtual device pass through for high speed VM networking. In: ANCS ’15: Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for Networking and Communications Systems, May 2015
Hsieh, C.-L., Weng, N.: Scalable many-field packet classification using multidimensional-cutting via selective bit-concatenation. In: ANCS ’15: Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for Networking and Communications Systems, May 2015
Silva, A.: A short introduction to the coalgebraic method. SIGLOG News. 2(2) (April 2015)
Chetty, M., Kim, H., Sundaresan, S., Burnett, S., Feamster, N., Keith Edwards, W.: uCap: an internet data management tool for the home. In: CHI ’15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, April 2015
Verma, A., Pedrosa, L., Korupolu, M., Oppenheimer, D., Tune, E., Wilkes, J.: Large-scale cluster management at Google with Borg. In: EuroSys ’15: Proceedings of the Tenth European Conference on Computer Systems, April 2015
Tobias Distler, Christopher Bahn, Alysson Bessani, Frank Fischer, Flavio Junqueira. Extensible distributed coordination. April 2015 EuroSys ’15: Proceedings of the Tenth European Conference on Computer Systems
Leners, J.B., Gupta, T., Aguilera, M.K., Walfish, M.: Taming uncertainty in distributed systems with help from the network. In: EuroSys ’15: Proceedings of the Tenth European Conference on Computer Systems, April 2015
Ambrosin, M., Conti, M., De Gaspari, F., Poovendran, R.: LineSwitch: efficiently managing switch flow in software-defined networking while effectively tackling DoS attacks. In: ASIA CCS ’15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, April 2015
Dong, X., Lin, H., Tan, R., Iyer, R.K., Kalbarczyk, Z.: Software-defined networking for smart grid resilience: opportunities and challenges. In: CPSS ’15: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, April 2015
Ma, J., Sui, X., Sun, N., Li, Y., Yu, Z., Huang, B., Xu, T., Yao, Z., Chen, Y., Wang, H., Zhang, L., Bao, Y.: Supporting differentiated services in computers via programmable architecture for resourcing-on-demand (PARD). In: ASPLOS ’15: Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, March 2015
Rehman, M.S., Boles, J., Hammoud, M., Sakr, M.F.: A cloud computing course: from systems to services. In: SIGCSE ’15: Proceedings of the 46th ACM Technical Symposium on Computer Science Education, February 2015
Kangarlou, A., Shete, S., Strunk, J.D.: Chronicle: capture and analysis of NFS workloads at line rate. In: FAST’15: Proceedings of the 13th USENIX Conference on File and Storage Technologies, February 2015
Chockler, G., Junqueira, F., Rodrigues, R., Vigfusson, Y.: LADIS’14: 8th Workshop on Large-Scale Distributed Systems and Middleware. SIGOPS Operating Systems Review, vol. 49, issue 1, January 2015
Chlipala, A.: From network interface to multithreaded web applications: a case study in modular program verification. In: POPL ’15: Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 2015
Foster, N., Kozen, D., Milano, M., Silva, A., Thompson, L.: A coalgebraic decision procedure for NetKAT. In: POPL ’15: Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 2015
Alt, L., Beverly, R., Dainotti, A.: Uncovering network tarpits with degreaser. In: CSAC ’14: Proceedings of the 30th Annual Computer Security Applications Conference, December 2014
Spillner, J., Schill, A.: Algorithms for dispersed processing. In: UCC ’14: Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, December 2014
Bleikertz, S., Vogel, C., Groß, T.: Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures. In: ACSAC ’14: Proceedings of the 30th Annual Computer Security Applications Conference, December 2014
Renner, T., Stanik, A., Körner, M., Kao, O.: Portable SDN applications on the PaaS layer. In: UCC ’14: Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, December 2014
de Jesus, W.P., da Silva, D.A., de Sousa Júnior, R.T., da Frota, F.V.L.: Analysis of SDN contributions for cloud computing security. In: UCC ’14: Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, December 2014
Soulé, R., Basu, S., Marandi, P.J., Pedone, F., Kleinberg, R., Sirer, E.G., Foster, N.: Merlin: a language for provisioning network resources. In: CoNEXT ’14: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, December 2014
Kuzniar, M., Peresini, P., Kostić, D.: Providing reliable FIB update acknowledgments in SDN. In: CoNEXT ’14: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, December 2014
Abaid, Z., Rezvani, M., Jha, S.: MalwareMonitor: an SDN-based framework for securing large networks. In: CoNEXT Student Workshop ’14: Proceedings of the 2014 CoNEXT on Student Workshop, December 2014
Moradi, M., Wu, W., Li, L.E., Mao, Z.M.: SoftMoW: recursive and reconfigurable cellular WAN architecture. In: CoNEXT ’14: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, December 2014
Durairajan, R., Sommers, J., Barford, P.: Controller-agnostic SDN debugging. In: CoNEXT ’14: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, December 2014
Castro, I., Cardona, J.C., Gorinsky, S., Francois, P.: Remote peering: more peering without internet flattening. In: CoNEXT ’14: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, December 2014
Wang, A., Guo, Y., Hao, F., Lakshman, T.V., Chen, S.: Scotch: elastically scaling up SDN control-plane using vSwitch based overlay. In: CoNEXT ’14: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, December 2014
Klingel, D., Khondoker, R., Marx, R., Bayarou, K.: Security analysis of software defined networking architectures: PCE, 4D and SANE. In: AINTEC ’14: Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference, November 2014
Tasch, M., Khondoker, R., Marx, R., Bayarou, K.: Security analysis of security applications for software defined networks. In: AINTEC ’14: Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference, November 2014
Mayer, S., Hassan, Y.N., Sörös, G.: A magic lens for revealing device interactions in smart environments. In: SA ’14: SIGGRAPH Asia 2014 Mobile Graphics and Interactive Applications, November 2014
Muhamedyev, R.I., Kalimoldaev, M.N., Uskenbayeva, R.K.: Semantic network of ICT domains and applications. In: EGOSE ’14: Proceedings of the 2014 Conference on Electronic Governance and Open Society: Challenges in Eurasia, November 2014
Toso, G., Munaretto, D., Conti, M., Zorzi, M.: Attack resilient underwater networks through software defined networking. In: WUWNET ’14: Proceedings of the International Conference on Underwater Networks & Systems, November 2014
McDaniel, P., Jaeger, T., La Porta, T.F., Papernot, N., Walls, R.J., Kott, A., Marvel, L., Swami, A., Mohapatra, P., Krishnamurthy, S.V., Neamtiu, I.: Security and science of agility. In: MTD ’14: Proceedings of the First ACM Workshop on Moving Target Defense, November 2014
Jafarian, J.H.H., Al-Shaer, E., Duan, Q.: Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers. In: MTD ’14: Proceedings of the First AM Workshop on Moving Target Defense, November 2014
Cuzzocrea, A., Song, I.-Y.: Big graph analytics: the state of the art and future research agenda. In: DOLAP ’14: Proceedings of the 17th International Workshop on Data Warehousing and OLAP, November 2014
Sommer, R., Vallentin, M., De Carli, L., Paxson, V.: HILTI: an abstract execution environment for deep, stateful network traffic analysis. In: IMC ’14: Proceedings of the 2014 Conference on Internet Measurement Conference, November 2014
Richter, P., Smaragdakis, G., Feldmann, A., Chatzis, N., Boettger, J., Willinger, W.: Peering at peerings: on the role of IXP route servers. In: IMC ’14: Proceedings of the 2014 Conference on Internet Measurement Conference, November 2014
Pujol, E., Richter, P., Chandrasekaran, B., Smaragdakis, G., Feldmann, A., Maggs, B.M., Ng, K.-C.: Back-office web traffic on the internet. In: IMC ’14: Proceedings of the 2014 Conference on Internet Measurement Conference, November 2014
Butt, S., Ganapathy, V., Srivastava, A.: On the control plane of a self-service cloud platform. In: SOCC ’14: Proceedings of the ACM Symposium on Cloud Computing, November 2014
Shin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., Yegneswaran, V., Noh, J., Kang, B.B.: Rosemary: a robust, secure, and high-performance network operating system. In: CCS ’14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, November 2014
Yuan, Y., Alur, R., Loo, B.T.: NetEgg: programming network policies by examples. In: HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks, October 2014
Vissicchio, S., Vanbever, L., Rexford, J.: Sweet little lies: fake topologies for flexible routing. In: HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks, October 2014
Chandrasekaran, B., Benson, T.: Tolerating SDN application failures with LegoSDN. In: HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks, October 2014
Ludwig, A., Rost, M., Foucard, D., Schmid, S.: Good network updates for bad packets: waypoint enforcement beyond destination-based routing policies. In: HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks, October 2014
Donovan, S., Feamster, N.: Intentional network monitoring: finding the needle without capturing the haystack. In: HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks, October 2014
Schlinker, B., Zarifis, K., Cunha, I., Feamster, N., Katz-Bassett, E.: PEERING: an AS for Us. In: HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks, October 2014
Majumdar, R., Tetali, S.D., Wang, Z.: Kuai: a model checker for software-defined networks. In: FMCAD ’14: Proceedings of the 14th Conference on Formal Methods in Computer-Aided Design, October 2014
Bonelli, N., Giordano, S., Procissi, G., Abeni, L.: A purely functional approach to packet processing. In: ANCS ’14: Proceedings of the tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, October 2014
Kaplan, M., Zheng, C., Monaco, M., Keller, E., Sicker, D.: WASP: a software-defined communication layer for hybrid wireless networks. In: ANCS ’14: Proceedings of the tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, October 2014
Kotani, D., Okabe, Y.: A packet-in message filtering mechanism for protection of control plane in openflow networks. In: ANCS ’14: Proceedings of the tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, October 2014
Arumaithurai, M., Chen, J., Monticelli, E., Fu, X., Ramakrishnan, K.K.: Exploiting ICN for flexible management of software-defined networks. In: INC ’14: Proceedings of the 1st International Conference on Information-Centric Networking, September 2014
Casado, M., Foster, N., Guha, A.: Abstractions for software-defined networks. Commun. ACM 57(10), 86–95 (2014)
Sapio, A., Liao, Y., Baldi, M., Ranjan, G., Risso, F., Tongaonkar, A., Torres, R., Nucci, A.: Per-user policy enforcement on mobile apps through network functions virtualization. In: MobiArch ’14: Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture, September 2014
Kuo, Y.-S., Pannuto, P., Dutta, P.: System architecture directions for a software-defined lighting infrastructure. In: VLCS ’14: Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, September 2014
Juhola, A., Ahola, T., Ahola, K.: Adaptive risk management with ontology linked evidential statistics and SDN. In: ECSAW ’14: Proceedings of the 2014 European Conference on Software Architecture Workshops, August 2014
Casey, C.J., Sutton, A., Sprintson, A.: tinyNBI: distilling an API from essential OpenFlow abstractions. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Chandrasekaran, B., Benson, T.: Tolerating SDN application failures with LegoSDN. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Durairajan, R., Sommers, J., Barford, P.: OFf: bug spray for openflow. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Matsumoto, S., Hitz, S., Perrig, A.: Fleet: defending SDNs from malicious administrators. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Ghorbani, S., Godfrey, B.: Towards correct network virtualization. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Jagadeesan, N.A., Pal, R., Nadikuditi, K., Huang, Y., Shi, E., Yu, M.: A secure computation framework for SDNs. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Hand, R., Keller, E.: Closed flow: openflow-like control over proprietary devices. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Agarwal, K., Dixon, C., Rozner, E., Carter, J.: Shadow MACs: scalable label-switching for commodity Ethernet. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Heinonen, J., Partti, T., Kallio, M., Lappalainen, K., Flinck, H., Hillo, J.: Dynamic tunnel switching for SDN-based cellular core networks. In: AllThingsCellular ’14: Proceedings of the 4th Workshop on All things Cellular: Operations, Applications, & Challenges, August 2014
Edwards, T.G., Belkin, W.: Using SDN to facilitate precisely timed actions on real-time data streams. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Fayaz, S.K., Sekar, V.: Testing stateful and dynamic data plans with Flow Test. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Jamjoom, H., Williams, D., Sharma, U.: Don’t call them middleboxes, call them middlepipes. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Berde, P., Gerola, M., Hart, J., Higuchi, Y., Kobayashi, M., Koide, T., Lantz, B., O’Connor, B., Radoslavov, P., Snow, W., Parulkar, G.: ONOS: towards an open, distributed SDN OS. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Bailey, J., Pemberton, D., Linton, A., Pelsser, C., Bush, R.: Enforcing RPKI-based routing policy on the data plane at an internet exchange. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Baldin, I., Huang, S., Gopidi, R.: A resource delegation framework for software defined networks. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Klaedtke, F., Karame, G.O., Bifulco, R., Cui, H.: Access control for SDN controllers. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Mekky, H., Hao, F., Mukherjee, S., Zhang, Z.-L., Lakshman, T.V.: Application-aware data plane processing in SDN. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Nagaraj, K., Katti, S.: ProCel: smart traffic handling for a scalable software EPC. In: HotSDN ’14: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, August 2014
Schlesinger, C., Greenberg, M., Walker, D.: Concurrent NetCore: from policies to pipelines. In: ICFP ’14: Proceedings of the 19th ACM SIGPLAN International Conference on Functional Programming, August 2014
Parniewicz, D., Doriguzzi Corin, R., Ogrodowczyk, L., Rashidi Fard, M., Matias, J., Gerola, M., Fuentes, V., Toseef, U., Zaalouk, A., Belter, B., Jacob, E., Pentikousis, K.: Design and implementation of an OpenFlow hardware abstraction layer. In: DCC ’14: Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, August 2014
Shanmugam, P.K., Subramanyam, N.D., Breen, J., Roach, C., Van der Merwe, J.: DEIDtect: towards distributed elastic intrusion detection. In: DCC ’14: Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, August 2014
Cao, Z., Kodialam, M., Lakshma, T.V.: Traffic steering in software defined networks: planning and online routing. In: DCC ’14: Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, August 2014
Shirali-Shahreza, S., Ganjali, Y.: Traffic statistics collection with FleXam. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014
Alwabel, A., Yu, M., Zhang, Y., Mirkovic, J.: SENSS: observe and control your own traffic in the internet. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014
Rasley, J., Stephens, B., Dixon, C., Rozner, E., Felter, W., Agarwal, K., Carter, J., Fonseca, R.: Planck: millisecond-scale monitoring and control for commodity networks. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014
Sun, P., Mahajan, R., Rexford, J., Yuan, L., Zhang, M., Arefin, A.: A network-state management service. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014
Gupta, A., Vanbever, L., Shahbaz, M., Donovan, S.P., Schlinker, B., Feamster, N., Rexford, J., Shenker, S., Clark, R., Katz-Bassett, E.: SDX: a software defined internet exchange. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014
Alizadeh, M., Edsall, T., Dharmapurikar, S., Vaidyanathan, R., Chu, K., Fingerhut, A., Lam, V.T., Matus, F., Pan, R., Yadav, N., Varghese, G.: CONGA: distributed congestion-aware load balancing for datacenters. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014
Li, J., Berg, S., Zhang, M., Reiher, P., Wei, T.: Drawbridge: software-defined DDoS-resistant traffic engineering. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014
Gember-Jacobson, A., Viswanathan, R., Prakash, C., Grandl, R., Khalid, J., Das, S., Akella, A.: OpenNF: enabling innovation in network function control. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014
Miao, R., Yu, M., Jain, N.: NIMBUS: cloud-scale attack detection and mitigation. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014
Donovan, S., Feamster, N.: NetAssay: providing new monitoring primitives for network operators. In: SIGCOMM ’14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014
Ma, L., He, T., Leung, K.K., Swami, A., Towsley, D.: Inferring link metrics from end-to-end path measurements: identifiability and monitor placement. IEEE/ACM Trans. Networking 22(4), 1351–1368 (2014)
Burgess, M.: Promise theory—what is it? Linux J. 2014(244) (2014)
Wolf, T., Griffioen, J., Calvert, K.L., Dutta, R., Rouskas, G.N., Baldin, I., Nagurney, A.: ChoiceNet: toward an economy plane for the internet. SIGCOMMComput. Commun. Rev. 44(3), 58–65 (2014)
Khan, K.R., Ahmed, Z., Ahmed, S., Syed, A., Khayam, S.A.: Rapid and scalable isp service delivery through a programmable middlebox. SIGCOMM Comput. Commun. Rev. 44(3), 31–37 (2014)
DeBruhl, B., Kroer, C., Datta, A., Sandholm, T., Tague, P.: Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming. In: WiSec ’14: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, July 2014
Neeman, H., Akin, D., Alexander, J., Brunson, D., Calhoun, S.P., Deaton, J., Fotou, F.F., George, B., Gentis, D., Gray, Z., Huebsch, E., Louthan, G., Runion, M., Snow, J., Zimmerman, B.: The OneOklahoma friction free network: towards a multi-institutional science DMZ in an EPSCoR State. In: XSEDE ’14: Proceedings of the 2014 Annual Conference on Extreme Science and Engineering Discovery Environment, July 2014
Tantar, A.-A., Tantar, E.: A survey on sustainability in ICT: a computing perspective. In: GECCO Comp ’14: Proceedings of the 2014 Conference Companion on Genetic and Evolutionary Computation Companion, July 2014
Fontes, R.R., Oliveira, A.L.C., Sampaio, P.N.M., Pinheiro, T.R., Figueira, R.A.R.B.: Authoring of OpenFlow networks with visual network description (SDN version) (WIP). In: SummerSim ’14: Proceedings of the 2014 Summer Simulation Multiconference, July 2014
Yu, Z., Li, M., Liu, Y., Li, X.: GatorCloud: a fine-grained and dynamic resource sharing architecture for multiple cloud services. In: BigSystem ’14: Proceedings of the 2014 ACM International Workshop on Software-Defined Ecosystems, June 2014
Moody, W.C., Anderson, J., Wange, K.-C., Apon, A.: Reconfigurable network testbed for evaluation of datacenter topologies. In: DIDC ’14: Proceedings of the Sixth International Workshop on Data Intensive Distributed Computing, June 2014
Farhadi, H., Du, P., Nakao, A.: User-defined actions for SDN. In: CFI ’14: Proceedings of the Ninth International Conference on Future Internet Technologies, June 2014
Naik, M.: Large-scale configurable static analysis. In: SOAP ’14: Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis, June 2014
Lee, J., Uddin, M., Tourrilhes, J., Sen, S., Banerjee, S., Arndt, M., Kim, K.-H., Nadeem, T.: meSDN: mobile extension of SDN. In: MCS ’14: Proceedings of the Fifth International Workshop on Mobile Cloud Computing & Services, June 2014
Crowley, P.: Author retrospective for characterizing processor architectures for programmable network interfaces. In: International Conference on Supercomputing 25th Anniversary Volume, June 2014
Ball, T., Bjørner, N., Gember, A., Itzhaky, S., Karbyshev, A., Sagiv, M., Schapira, M., Valadarsky, A.: VeriCon: towards verifying controller programs in software-defined networks. In: PLDI ’14: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, June 2014
Vadrevu, C.S.K., Wang, R., Tornatore, M., Martel, C.U., Mukherjee, B.: Degraded service provisioning in mixed-line-rate WDM backbone networks using multipath routing. IEEE/ACM Trans. Networking 22(3), 840–849 (2014)
Vishnoi, A., Poddar, R., Mann, V., Bhattacharya, S.: Effective switch memory management in OpenFlow networks. In: DEBS ’14: Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, May 2014
Jusko, J., Rehak, M., Pevny, T.: A memory efficient privacy preserving representation of connection graphs. In: ACySE ’14: Proceedings of the 1st International Workshop on Agents and CyberSecurity, May 2014
Vissicchio, S., Vanbever, L., Bonaventure, O.: Opportunities and research challenges of hybrid software defined networks. SIGCOMM Comput. Commun. Rev. 44(2), 70–75 (2014)
Bianchi, G., Bonola, M., Capone, A., Cascone, C.: OpenState: programming platform-independent stateful openflow applications inside the switch. SIGCOMM Comput. Commun. Rev. 44(2), 44–51 (2014)
Han, Y., Lu, W., Xu, S.: Characterizing the power of moving target defense via cyber epidemic dynamics. In: HotSoS ’14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, April 2014
Feamster, N., Rexford, J., Zegura, E.: The road to SDN: an intellectual history of programmable networks. SIGCOMM Comput. Commun. Rev. 44(2), 87–98 (2014)
Handigol, N., Heller, B., Jeyakumar, V., Mazières, D., McKeown, N.: I know what your packet did last hop: using packet histories to troubleshoot networks. In: NSDI’14: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, April 2014
Koponen, T., Amidon, K., Balland, P., Casado, M., Chanda, A., Fulton, B., Ganichev, I., Gross, J., Gude, N., Ingram, P., Jackson, E., Lambeth, A., Lenglet, R., Li, S.-H., Padmanabhan, A., Pettit, J., Pfaff, B., Ramanathan, R., Shenker, S., Shieh, A., Stribling, J., Thakkar, P., Wendlandt, D., Yip, A., Zhang, R.: Network virtualization in multi-tenant datacenters. In: NSDI’14: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, April 2014
Nelson, T., Ferguson, A.D., Scheer, M.J.G., Krishnamurthi, S.: Tierless programming and reasoning for software-defined networks. In: NSDI’14: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, April 2014
Hwang, J., Ramakrishnan, K.K., Wood, T.: NetVM: high performance and flexible networking using virtualization on commodity platforms. In: NSDI’14: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, April 2014
Khan, F., Hosein, N., Ghiasi, S., Chuah, C.-N., Sharma, P.: Streaming solutions for fine-grained network traffic measurements and analysis. IEEE/ACM Trans. Networking 22(2), 377–390 (2014)
Zeng, H., Kazemian, P., Varghese, G., McKeown, N.: Automatic test packet generation. IEEE/ACM Trans. Networking 22(2), 554–566 (2014)
Mushi, M., Dutta, R.: Data-driven study of network administration in the evolving landscape of software defined networking. In: HCBDR ’14: Proceedings of the 2014 Workshop on Human Centered Big Data Research, April 2014
Gomes, R.L., Bittencourt, L.F., Madeira, E.R.M.: A similarity model for virtual networks negotiation. In: SAC ’14: Proceedings of the 29th Annual ACM Symposium on Applied Computing, March 2014
Bumgardner, V.K.C., Marek, V.W.: Scalable hybrid stream and hadoop network analysis system. In: ICPE ’14: Proceedings of the 5th ACM/SPEC International Conference on Performance Engineering, March 2014
Stecklina, J.: Shrinking the hypervisor one subsystem at a time: a userspace packet switch for virtual machines. In: VEE ’14: Proceedings of the 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, March 2014
Anderson, C.J., Foster, N., Guha, A., Jeannin, J.-B., Kozen, D., Schlesinger, C., Walker, D.: NetKAT: semantic foundations for networks. In: POPL ’14: Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 2014
Haw, R., Hong, C.S., Lee, S.: An efficient content delivery framework for SDN based LTE network. In: ICUIMC ’14: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, January 2014
Li, X., Freedman, M.J.: Scaling IP multicast on datacenter topologies. In: CoNEXT ’13: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, December 2013
Lee, S.B., Kang, M.S., Gligor, V.D.: CoDef: collaborative defense against large-scale link-flooding attacks. In: CoNEXT ’13: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, December 2013
Jin, X., Li, L.E., Vanbever, L., Rexford, J.: SoftCell: scalable and flexible cellular core network architecture. In: CoNEXT ’13: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, December 2013
Mysore, R.N., Porter, G., Vahdat, A.: FasTrak: enabling express lanes in multi-tenant data centers. In: CoNEXT ’13: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, December 2013
Sun, X., Xie, G.G.: Minimizing network complexity through integrated top-down design. In: CoNEXT ’13: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, December 2013
Lu, H., Arora, N., Zhang, H., Lumezanu, C., Rhee, J., Jiang, G.: HybNET: network manager for a hybrid network infrastructure. In: Middleware Industry ’13: Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX International Middleware Conference, December 2013
Hand, R., Ton, M., Keller, E.: Active security. In: HotNets-XII: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, November 2013
Monaco, M., Michel, O., Keller, E.: Applying operating system principles to SDN controller design. In: HotNets-XII: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, November 2013
Sivaraman, A., Winstein, K., Subramanian, S., Balakrishnan, H.: No silver bullet: extending SDN to the data plane. In: HotNets-XII: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, November 2013
Soulé, R., Basu, S., Kleinberg, R., Sirer, E.G., Foster, N.: Managing the network with Merlin. In: HotNets-XII: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, November 2013
Mogul, J.C., AuYoung, A., Banerjee, S., Popa, L., Lee, J., Mudigonda, J., Sharma, P., Turner, Y.: Corybantic: towards the modular composition of SDN control programs. In: HotNets-XII: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, November 2013
Levine, D., Katti, S., Oran D.: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks. In: HotNets-XII: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, November 2013
Dart, E., Rotman, L., Tierney, B., Hester, M., Zurawski, J.: The Science DMZ: a network design pattern for data-intensive science. In: SC ’13: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, November 2013
Shin, S., Yegneswaran, V., Porras, P., Gu, G.: AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. In: CCS ’13: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, November 2013
Chatzis, N., Smaragdakis, G., Feldmann, A., Willinger, W.: There is more to IXPs than meets the eye. SIGCOMM Comput. Commun. Rev. 43(5), 19–28 (2013)
Crowcroft, J., Fidler, M., Nahrstedt, K., Steinmetz, R.: Is SDN the de-constraining constraint of the future internet? SIGCOMM Comput. Commun. Rev. 43(5), 13–18 (2013)
TalebiFard, P., Nicanfar, H., Hu, X., Leung, V.C.M.: Semantic based networking of information in vehicular clouds based on dimensionality reduction. In: DIVANet ’13: Proceedings of the Third ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, November 2013
Thereska, E., Ballani, H., O’Shea, G., Karagiannis, T., Rowstron, A., Talpey, T., Black, R., Zhu, T.: IOFlow: a software-defined storage architecture. In: SOSP ’13: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, November 2013
Fitfield, T.: Introduction to OpenStack. Linux J. 2013(235) (2013)
Ma, L., He, T., Leung, K.K., Swami, A., Towsley, D.: Identifiability of link metrics based on end-to-end path measurements. In: IMC ’13: Proceedings of the 2013 Conference on Internet Measurement Conference, October 2013
Buddhikot, M.M.: Towards a virtual cellular network with variable grade spectrum: challenges and opportunities. In: MobiCom ’13: Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, September 2013
Fund, F., Korakis, T., Panwar, S.S.: Implementation of a protocol for cooperative packet recovery over hybrid networks. In: WiNTECH ’13: Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization, September 2013
Kirkpatrick, K.: Software-defined networking. Commun. ACM 56(9), 16–19 (2013)
Fayazbakhsh, S.K., Sekar, V., Yu, M., Mogul, J.C.: FlowTags: enforcing network-wide policies in the presence of dynamic middlebox actions. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Antonenko, V., Smelyanskiy, R.: Global network modelling based on mininet approach. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Shirali-Shahreza, S., Ganjali, Y.: FleXam: flexible sampling extension for monitoring and security applications in openflow. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Song, H.: Protocol-oblivious forwarding: unleash the power of SDN through a future-proof forwarding plane. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Martins, J., Ahmed, M., Raiciu, C., Huici, F.: Enabling fast, dynamic network processing with clickOS. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Wen, X., Chen, Y., Hu, C., Shi, C., Wang, Y.: Towards a secure controller platform for openflow applications. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Heller, B., Scott, C., McKeown, N., Shenker, S., Wundsam, A., Zeng, H., Whitlock, S., Jeyakumar, V., Handigol, N., McCauley, J., Zarifis, K., Kazemian, P.: Leveraging SDN layering to systematically troubleshoot networks. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Katta, N.P., Rexford, J., Walker, D.: Incremental consistent updates. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Benton, K., Camp, L.J., Small, C.: OpenFlow vulnerability assessment. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Barkai, S., Katz, R., Farinacci, D., Meyer, D.: Software defined flow-mapping for scaling virtualized network functions. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Hong, K., Lillethun, D., Ramachandran, U., Ottenwälder, B., Koldehofe, B.: Mobile fog: a programming model for large-scale applications on the internet of things. In: MCC ’13: Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, August 2013
Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Reitblatt, M., Canini, M., Guha, A., Foster, N.: FatTire: declarative fault tolerance for software-defined networks. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Nelson, T., Guha, A., Dougherty, D.J., Fisler, K., Krishnamurthi, S.: A balance of power: expressive, analyzable controller programming. In: HotSDN ’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013
Qazi, A., Tu, C.-C., Chiang, L., Miao, R., Sekar, V., Yu, M.: SIMPLE-fying middlebox policy enforcement using SDN Zafar. In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013
Crisan, D., Birke, R., Cressier, G., Minkenberg, C., Gusat, M.: Got loss? Get zOVN! In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013
Qazi, Z.A., Lee, J., Jin, T., Bellala, G., Arndt, M., Noubir, G.: Application-awareness in SDN. In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013
Patel, P., Bansal, D., Yuan, L., Murthy, A., Greenberg, A., Maltz, D.A., Kern, R., Kumar, H., Zikos, M., Wu, H., Kim, C., Karri, N.: Ananta: cloud scale load balancing. In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013
Ferguson, A.D., Guha, A., Liang, C., Fonseca, R., Krishnamurthi, S.: Participatory networking: an API for application control of SDNs. In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013
Jain, S., Kumar, A., Mandal, S., Ong, J., Poutievski, L., Singh, A., Venkata, S., Wanderer, J., Zhou, J., Zhu, M., Zolla, J., Hölzle, U., Stuart, S., Vahdat, A.: B4: experience with a globally-deployed software defined wan. In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013
Gember, A., Grandl, R., Khalid, J., Akella, A.: Design and implementation of a framework for software-defined middlebox networking. In: SIGCOMM ’13: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, August 2013
Ganegedara, T., Prasanna, V.: A comprehensive performance analysis of virtual routers on FPGA. Trans. Reconfigurable Technol. Syst. 6(2), 1–2 (2013)
Koldehofe, B., Dürr, F., Tariq, M.A.: Tutorial: event-based systems meet software-defined networking. In: DEBS ’13: Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems, June 2013
Pescapé, A., Fernandes, S.: Proceedings of the first edition Workshop on High Performance and Programmable Networking. In: HPPN ’13: Proceedings of the First Edition Workshop on High Performance and Programmable Networking, June 2013
Gill, H., Lin, D., Han, X., Nguyen, C., Gill, T., Loo, B.T.: Scalanytics: a declarative multi-core platform for scalable composable traffic analytics. In: HPDC ’13: Proceedings of the 22nd International Symposium on High-performance Parallel and Distributed Computing, June 2013
Cui, Z., Bridges, P.G., Lange, J.R., Dinda, P.A.: Virtual TCP offload: optimizing ethernet overlay performance on advanced interconnects. In: HPDC ’13: Proceedings of the 22nd International Symposium on High-performance Parallel and Distributed Computing, June 2013
Guha, A., Reitblatt, M., Foster, N.: Machine-verified network controllers. In: PLDI ’13: Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, June 2013
Marotta, A., Carrozza, G., Avallone, S., Manetti, V.: An OpenFlow-based architecture for IaaS security. In: ATACCS ’13: Proceedings of the 3rd International Conference on Application and Theory of Automation in Command and Control Systems, May 2013
Jin, D., Nicol, D.M.: Parallel simulation of software defined networks. In: SIGSIM-PADS ’13: Proceedings of the 2013 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, May 2013
Zhang, Z., Wu, C., Cheung, D.W.L.: A survey on cloud interoperability, taxonomies, standards, and practice. SIGMETRICS Perform. Eval. Rev. 40(4), 13–22 (2013)
Costa-Pérez, X., Festag, A., Kolbe, H.-J., Quittek, J., Schmid, S., Stiemerling, M., Swetina, J., van der Veen, H.: Latest trends in telecommunication standards. SIGCOMM Comput. Commun. Rev. 43(2), 64–71 (2013)
Skowyra, R.W., Lapets, A., Bestavros, A., Kfoury, A.: Verifiably-safe software-defined networks for CPS. In: HiCoNS ’13: Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems, April 2013
Braun, T., Mauthe, A., Siris, V.: Service-centric networking extensions. In: SAC ’13: Proceedings of the 28th Annual ACM Symposium on Applied Computing, March 2013
Madhavapeddy, A., Mortier, R., Rotsos, C., Scott, D., Singh, B., Gazagnaire, T., Smith, S., Hand, S., Crowcroft, J.: Unikernels: library operating systems for the cloud. In: ASPLOS ’13: Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, April 2013
Malkhi, D., van Renesse, R.: Workshop report on LADIS 2012. SIGOPS Oper. Syst. Rev. 47(1) (2013)
Rexford, J., Zave, P.: Report of the DIMACS working group on abstractions for network services, architecture, and implementation. SIGCOMM Comput. Commun. Rev. 43(1), 56–59 (2013)
Brighten Godfrey, P.: Hotnets 2012 highlights. SIGCOMM Comput. Commun. Rev. 43(1), 38–42 (2013)
Sen, S.: New products. Linux J. 2013(225) (2013)
Sen, S.: Review of PODC 2012. SIGACT News 43(4) (2012)
Sun, X., Rao, S.G., Xie, G.G.: Modeling complexity of enterprise routing design. In: CoNEXT ’12: Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies, December 2012
Mendonca, M., Obraczka, K., Turletti, T.: The case for software-defined networking in heterogeneous networked environments. In: CoNEXT Student ’12: Proceedings of the 2012 ACM Conference on CoNEXT Student Workshop, December 2012
Thai, P.W., de Oliveira, J.C.: Decoupling BGP policy from routing with programmable reactive policy control. In: CoNEXT Student ’12: Proceedings of the 2012 ACM Conference on CoNEXT Student Workshop, December 2012
Stephens, B., Cox, A., Felter, W., Dixon, C., Carter, J.: PAST: scalable ethernet for data centers. In: CoNEXT ’12: Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies, December 2012
Soliman, M., Nandy, B., Lambadaris, I., Ashwood-Smith, P.: Source routed forwarding with software defined control, considerations and implications. In: CoNEXT Student ’12: Proceedings of the 2012 ACM Conference on CoNEXT Student Workshop, December 2012
Costa, P., Hu, W., Sekar, V.: Proceedings of the 2012 ACM Conference on CoNEXT Student Workshop. In: CoNEXT Student ’12: Proceedings of the 2012 ACM Conference on CoNEXT Student Workshop, December 2012
Vanbever, L., Vissicchio, S., Pelsser, C., Francois, P., Bonaventure, O.: Lossless migrations of link-state IGPs. IEEE/ACM Trans. Networking 20(6), 1842–1855 (2012)
Gember, A., Dragga, C., Akella, A.: ECOS: leveraging software-defined networks to support mobile application offloading. In: ANCS ’12: Proceedings of the Eighth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, October 2012
Kotronis, V., Dimitropoulos, X., Ager, B.: Outsourcing the routing control logic: better internet routing based on SDN principles. In: HotNets-XI: Proceedings of the 11th ACM Workshop on Hot Topics in Networks, October 2012
Reitblatt, M., Foster, N., Rexford, J., Schlesinger, C., Walker, D.: Abstractions for network update. SIGCOMM Comput. Commun. Rev. 42(4), 323–334 (2012)
Ahmed, M., Huici, F., Jahanpanah, A.: Enabling dynamic network processing with clickOS. SIGCOMM Comput. Commun. Rev. 42(4), 293–294 (2012)
Khurshid, A., Zhou, W., Matthew, C., Brighten Godfrey, P.: Veriflow: verifying network-wide invariants in real time. SIGCOMM Comput. Commun. Rev. 42(4), 467–472 (2012)
Kim, N., Kim, J.W.: Prototype of a programmable computing/networking switch for multi-screen content consumption. In: CFI ’12: Proceedings of the 7th International Conference on Future Internet Technologies, September 2012
Chang, D., Suh, J., Jung, H., Kwon, T.T., Choi, Y.: How to realize CDN interconnection (CDNI) over OpenFlow? In: CFI ’12: Proceedings of the 7th International Conference on Future Internet Technologies, September 2012
Ko, B.J., Pappas, V., Raghavendra, R., Song, Y., Dilmaghani, R.B., Lee, K.-W., Verma, D.: An information-centric architecture for data center networks. In: ICN ’12: Proceedings of the Second Edition of the ICN Workshop on Information-Centric Networking, August 2012
Gutz, S., Story, A., Schlesinger, C., Foster, N.: Splendid isolation: a slice abstraction for software-defined networks. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012
Reitblatt, M., Foster, N., Rexford, J., Schlesinger, C., Walker, D.: Abstractions for network update. In: SIGCOMM ’12: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 2012
Casado, M., Koponen, T., Shenker, S., Tootoonchian, A.: Fabric: a retrospective on evolving SDN. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012
Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012
Rothenberg, C.E., Nascimento, M.R., Salvador, M.R., Corrêa, C.N.A., de Lucena, S.C., Raszuk, R.: Revisiting routing control platforms with the eyes and muscles of software-defined networking. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012
Mogul, J.C., Congdon, P.: Hey, you darned counters! get off my ASIC! In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012
Ahmed, M., Huici, F., Jahanpanah, A.: Enabling dynamic network processing with clickOS. In: SIGCOMM ’12: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 2012
Ghorbani, S., Caesar, M.: Walk the line: consistent network updates with bandwidth guarantees. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012
Porras, P., Shin, S., Yegneswaran, V., Fong, M., Tyson, M., Gu, G.: A security enforcement kernel for OpenFlow networks. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012
Khurshid, A., Zhou, W., Caesar, M., Godfrey, P.B.: VeriFlow: verifying network-wide invariants in real time. In: HotSDN ’12: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, August 2012
Chetty, M., Feamster, N.: Refactoring network infrastructure to improve manageability: a case study of home networking. SIGCOMM Comput. Commun. Rev. 42(3), 54–61 (2012)
Stabler, G., Rosen, A., Goasguen, S., Wang, K.-C.: Elastic IP and security groups implementation using OpenFlow. In: VTDC ’12: Proceedings of the 6th International Workshop on Virtualization Technologies in Distributed Computing Date, June 2012
Monsanto, C., Foster, N., Harrison, R., Walker, D.: A compiler and run-time system for network programming languages. In: POPL ’12: Proceedings of the 39th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 2012
Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., Wilcox, J.: Intelligent design enables architectural evolution. In: HotNets-X: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, November 2011
Reitblatt, M., Foster, N., Rexford, J., Walker, D.: Consistent updates for software-defined networks: change you can believe in! In: HotNets-X: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, November 2011
Lin, P., Bi, J., Hu, H., Feng, T., Jiang, X.: A quick survey on selected approaches for preparing programmable networks. In: AINTEC ’11: Proceedings of the 7th Asian Internet Engineering Conference, November 2011
Benson, T., Akella, A., Shaikh, A., Sahu, S.: CloudNaaS: a cloud networking platform for enterprise applications. In: SOCC ’11: Proceedings of the 2nd ACM Symposium on Cloud Computing, October 2011
Mai, H., Khurshid, A., Agarwal, R., Caesar, M., Godfrey, P.B., King, S.T.: Debugging the data plane with anteater. In: SIGCOMM ’11: Proceedings of the ACM SIGCOMM 2011 Conference, August 2011
Koponen, T., Shenker, S., Balakrishnan, H., Feamster, N., Ganichev, I., Ali, G., Godfrey, P.B., McKeown, N., Parulkar, G., Raghavan, B., Rexford, J., Arianfar, S., Kuptsov, D.: Architecting for innovation. SIGCOMM Comput. Commun. Rev. 41(3) (2011)
Nascimento, M.R., Rothenberg, C.E., Salvador, M.R., Corrêa, C.N.A., de Lucena, S.C., Magalhães, M.F.: Virtual routers as a service: the RouteFlow approach leveraging software-defined networks. In: CFI ’11: Proceedings of the 6th International Conference on Future Internet Technologies, June 2011
Koponen, T., Casado, M., Gude, N., Stribling, J., Poutievski, L., Zhu, M., Ramanathan, R., Iwata, Y., Inoue, H., Hama, T., Shenker, S.: Onix: a distributed control platform for large-scale production networks. In: OSDI’10: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, October 2010
Bremler-Barr, A., Hay, D., Hendler, D., Roth, R.M.: PEDS: a parallel error detection scheme for TCAM devices. IEEE/ACM Trans. Networking 18(5), 1345–1358 (2010)
Rexford, J., Dovrolis, C.: Future Internet architecture: clean-slate versus evolutionary research. Commun. ACM 53(9), 36–40 (2010)
Casado, M., Freedman, M.J., Pettit, J., Luo, J., McKeown, N., Shenker, S.: Ethane: taking control of the enterprise. In: ACM SIGCOMM’07, 2007
McKeown, N., et al.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69–74 (2008)
Song, S.: Improving network health monitoring accuracy based on data fusion for software defined networking. In: Park, J.J., Stojmenovic, I., Choi, M., Xhafa, F. (eds.) Future Information Technology. Springer, Berlin (2014). doi:10.1007/978-3-642-40861-8_65. http://link.springer.com/chapter/10.1007/978-3-642-40861-8_65
Tsugawa, M., Matsunaga, A., Fortes, J.A.B.: Cloud computing security: what changes with software-defined networking? In: Secure Cloud Computing, pp. 77–93. Springer, New York (2014). doi:10.1007/978-1-4614-9278-8_4. http://link.springer.com/chapter/10.1007/978-1-4614-9278-8_4
Mehdi, S.A., Khalid, J., Khayam, S.A.: Revisiting traffic anomaly detection using software defined networking. In: Recent Advances in Intrusion Detection, pp. 161–180. Springer, Berlin (2011). doi:10.1007/978-3-642-23644-0_9. http://link.springer.com/chapter/10.1007/978-3-642-23644-0_9
Monfared, A.T., Rong, C.: Multi-tenant network monitoring based on software defined networking. In: On the Move to Meaningful Internet Systems: OTM 2013 Conferences, pp. 327–341. Springer, Berlin (2013). doi:10.1007/978-3-642-41030-7_24. http://link.springer.com/chapter/10.1007/978-3-642-41030-7_24
Ruponen, S.: On software-defined networking for rural areas: controlling wireless networks with OpenFlow. In: e-Infrastructure and e-Services for Developing Countries. Springer, Berlin (2014). doi:10.1007/978-3-319-08368-1_5. http://link.springer.com/chapter/10.1007/978-3-319-08368-1_5
Lin, L., Lin, P.: Software-defined networking (SDN) for cloud applications. In: Cloud Computing. Springer, Berlin (2014). doi:10.1007/978-3-319-10530-7_9. http://link.springer.com/chapter/10.1007/978-3-319-10530-7_9
Singh, S., Khan, R.A., Alka, A.: Applicability of software defined networking in campus network. In: Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, pp. 619–627. Springer, Berlin (2015). doi:10.1007/978-3-319-12012-6_68. http://link.springer.com/chapter/10.1007/978-3-319-12012-6_68
Karimzadeh, M., Sperotto, A., Pras, A.: Software defined networking to improve mobility management performance. In: Monitoring and Securing Virtualized Networks and Services, pp. 118–122. Springer, Berlin (2014). doi:10.1007/978-3-662-43862-6_14. http://link.springer.com/chapter/10.1007/978-3-662-43862-6_14
Venmani, D.P., Gourhant, Y., Reynaud, L., Chemouil, P., Zeghlache, D.: Substitution networks based on software defined networking. In: Ad Hoc Networks, pp. 242–259. Springer, Berlin (2013). doi:10.1007/978-3-642-36958-2_17. http://link.springer.com/chapter/10.1007/978-3-642-36958-2_17
Ryoo, I., Na, W., Kim, S.: Information exchange architecture based on software defined networking for cooperative intelligent transportation systems. Cluster Comput. 18(2), 771–782 (2015). doi:10.1007/s10586-015-0442-z. http://link.springer.com/article/10.1007/s10586-015-0442-z
Vizváry, M., Vykopal, J.: Future of DDoS attacks mitigation in software defined networks. In: Monitoring and Securing Virtualized Networks and Services, pp. 123–127. Springer, Berlin (2014). doi:10.1007/978-3-662-43862-6_15. http://link.springer.com/chapter/10.1007/978-3-662-43862-6_15
Tantar, E., Palattella, M.R., Avanesov, T., Kantor, M., Engel, T.: Cognition: a tool for reinforcing security in software defined networks. In: EVOLVE—A Bridge Between Probability, Set Oriented Numerics, and Evolutionary Computation, pp. 61–78. Springer, Berlin (2014). doi:10.1007/978-3-319-07494-8_6. http://link.springer.com/chapter/10.1007/978-3-319-07494-8_6
Han, W., Hu, H., Ahn, G.-J.: LPM: layered policy management for software-defined networks. In: Data and Applications Security and Privacy XXVIII, pp. 356–363. Springer, Berlin (2014). doi:10.1007/978-3-662-43936-4_23. http://link.springer.com/chapter/10.1007/978-3-662-43936-4_23
Zakharov, V.A., Smelyansky, R.L., Chemeritsky, E.V.: A formal model and verification problems for software defined networks. Autom. Cont. Comp. Sci. 48(7), 398–406 (2014). doi:10.3103/S0146411614070165. http://link.springer.com/article/10.3103/S0146411614070165
He, S., Jianwei, L., Mao, J., Jie, C.: Hierarchical solution for access control and authentication in software defined networks. In: Network and System Security, pp. 70–81. Springer, Berlin (2014). doi:10.1007/978-3-319-11698-3_6. http://link.springer.com/chapter/10.1007/978-3-319-11698-3_6
Kim, D., Byeon, O., Cho, K.: Federated software defined network operations for LHC experiments. J. Korean Phys. Soc. 63(5), 975–981 (2013). doi:10.3938/jkps.63.975. http://link.springer.com/article/10.3938/jkps.63.975
Marconett, D., Yoo, S.J.B.: FlowBroker: a software-defined network controller architecture for multi-domain brokering and reputation. J. Netw. Syst. Manage. 23(2), 328–359 (2015). doi:10.1007/s10922-014-9325-5. http://link.springer.com/article/10.1007/s10922-014-9325-5
Khasnabish, B., Choi, B.-Y., Feamster, N.: JONS: special issue on management of software-defined networks. J. Netw. Syst. Manage. 23(2), 249–251 (2015). doi:10.1007/s10922-014-9339-z. http://link.springer.com/article/10.1007/s10922-014-9339-z
Kim, D., Gil, J.-M.: Reliable and fault-tolerant software-defined network operations scheme for remote 3D printing. J. Electron. Mater. 44(3), 804–814 (2015). doi:10.1007/s11664-014-3548-9. http://link.springer.com/article/10.1007/s11664-014-3548-9
Rass, S., Rainer, B., Vavti, M., Göllner, J., Peer, A., Schauer, S.: Secure communication over software-defined networks. Mob. Netw. Appl. 20(1), 105–110 (2015). doi:10.1007/s11036-015-0582-7. http://link.springer.com/article/10.1007/s11036-015-0582-7
Sun, P., Yu, M., Freedman, M.J., Rexford, J., Walker, D.: HONE: joint host-network traffic management in software-defined networks. J. Netw. Syst. Manage. 23(2), 374–399 (2015). doi:10.1007/s10922-014-9321-9. http://link.springer.com/article/10.1007/s10922-014-9321-9
Heorhiadi, V., Fayaz, S.K., Reiter, M.K., Sekar, V.: SNIPS: a software-defined approach for scaling intrusion prevention systems via offloading. In: Information Systems Security, pp. 9–29. Springer, Berlin (2014). doi:10.1007/978-3-319-13841-1_2. http://link.springer.com/chapter/10.1007/978-3-319-13841-1_2
Bhaumik, P., Zhang, S., Chowdhury, P., Lee, S.-S., Lee, J.H., Mukherjee, B.: Software-defined optical networks (SDONs): a survey. Photonic Netw. Commun. 28(1), 4–18 (2014). doi:10.1007/s11107-014-0451-5. http://link.springer.com/article/10.1007/s11107-014-0451-5
Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., Vasilakos, A.V.: Software-defined and virtualized future mobile and wireless networks: a survey. Mob. Netw. Appl. 20(1), 4–18 (2015). doi:10.1007/s11036-014-0533-8. http://link.springer.com/article/10.1007/s11036-014-0533-8
Wang, Y., Bi, J., Zhang, K.: Design and implementation of a software-defined mobility architecture for IP networks. Mob. Netw. Appl. 20(1), 40–52 (2015). doi:10.1007/s11036-015-0579-2. http://link.springer.com/article/10.1007/s11036-015-0579-2
Qadir, J., Ahmed, N., Ahad, N.: Building programmable wireless networks: an architectural survey. EURASIP J. Wireless Commun. Network. 1, 172 (2014). doi:10.1186/1687-1499-2014-172. http://link.springer.com/article/10.1186/1687-1499-2014-172
Ben Yoo, S.J., Liu, L., Proietti, R., Scott, R.P.: Software defined elastic optical networking in temporal, spectral, and spatial domains. Photonic Netw. Commun. 28(1), 19–33 (2014). doi:10.1007/s11107-014-0448-0. http://link.springer.com/article/10.1007/s11107-014-0448-0
Li, Y., Vasilakos, A.V.: Editorial: software-defined and virtualized future wireless networks. Mob. Netw. Appl. 20(1), 1–3 (2015). doi:10.1007/s11036-015-0569-4. http://link.springer.com/article/10.1007/s11036-015-0569-4
Rückert, J., Blendin, J., Hausheer, D.: Software-defined multicast for over-the-top and overlay-based live streaming in ISP networks. J. Netw. Syst. Manage. 23(2), 280–308 (2015). doi:10.1007/s10922-014-9322-8. http://link.springer.com/article/10.1007/s10922-014-9322-8
Bae, H.-B., Park, M.-W., Kim, S.-H., Chung, T.-M.: Zombie PC detection and treatment model on software-defined network. In: Computer Science and Its Applications, pp. 837–843. Springer, Berlin (2015). doi:10.1007/978-3-662-45402-2_119. http://link.springer.com/chapter/10.1007/978-3-662-45402-2_119
Bruni, R., Montanari, U., Sammartino, M.: Reconfigurable and software-defined networks of connectors and components. In: Software Engineering for Collective Autonomic Systems, pp. 73–106. Springer, Berlin (2015). doi:10.1007/978-3-319-16310-9_2. http://link.springer.com/chapter/10.1007/978-3-319-16310-9_2
Xiao, X.F., Kui, X.: The characterizes of communication contacts between vehicles and intersections for software-defined vehicular networks. Mob. Netw. Appl. 20(1), 98–104 (2015). doi:10.1007/s11036-014-0535-6. http://link.springer.com/article/10.1007/s11036-014-0535-6
Yu, C., Lumezanu, C., Sharma, A., Xu, Q., Jiang, G., Madhyastha, H.V.: Software-defined latency monitoring in data center networks. In: Passive and Active Measurement, pp. 360–372. Springer, Berlin (2015). doi:10.1007/978-3-319-15509-8_27. http://link.springer.com/chapter/10.1007/978-3-319-15509-8_27
Nikitinskiy, M.A., Alekseev, I.V.: Analyzing the possibility of applying asymmetric transport protocols in terms of software defined networks. Autom. Cont. Comput. Sci. 49(2), 94–102 (2015). doi:10.3103/S0146411615020042. http://link.springer.com/article/10.3103/S0146411615020042
Geske, J., Stanchev, P.: Next-generation internet projects. In: Distributed Computer and Communication Networks, pp. 1–10. Springer, Berlin (2014). doi:10.1007/978-3-319-05209-0_1. http://link.springer.com/chapter/10.1007/978-3-319-05209-0_1
Jung, J.K., Hong, J.H., Chung, T.M.: A study of reducing resource waste for mobile grid with software defined network. In: Computational Science and Its Applications—ICCSA 2014, pp. 755–765. Springer, Berlin (2014). doi:10.1007/978-3-319-09147-1_55. http://link.springer.com/chapter/10.1007/978-3-319-09147-1_55
Simmons, J.M.: Dynamic optical networking. In: Optical Network Design and Planning, pp. 349–399. Springer, Berlin (2014). doi:10.1007/978-3-319-05227-4_8. http://link.springer.com/chapter/10.1007/978-3-319-05227-4_8
De Turck, F., Kiriha, Y., Hong, J.W.-K.: Management of the future internet: status and challenges. J. Netw. Syst. Manage. 20(4), 616–624 (2012). doi:10.1007/s10922-012-9245-1. http://link.springer.com/article/10.1007/s10922-012-9245-1
Chávez-Santiago, R., Szydełko, M., Kliks, A., Foukalas, F., Haddad, Y., Nolan, K.E., Kelly, M.Y., Masonta, M.T., Balasingham, I.: 5G: the convergence of wireless communications. Wireless Pers. Commun. (2015). doi:10.1007/s11277-015-2467-2. http://link.springer.com/article/10.1007/s11277-015-2467-2
Carrozza, G., Manetti, V., Marotta, A., Canonico, R., Avallone, S.: Exploiting SDN approach to tackle cloud computing security issues in the ATC scenario. In: Dependable Computing, pp. 54–60. Springer, Berlin (2013). doi:10.1007/978-3-642-38789-0_5. http://link.springer.com/chapter/10.1007/978-3-642-38789-0_5
Kozen, D.: NetKAT—a formal system for the verification of networks. In: Programming Languages and Systems, pp. 1–18. Springer, Berlin (2014). doi:10.1007/978-3-319-12736-1_1. http://link.springer.com/chapter/10.1007/978-3-319-12736-1_1
Sim, J.-H., Kim, S.-H., Park, M.-W., Chung, T.-M.: Eliminating duplicated paths to reduce computational cost of rule generation by using SDN. In: Computational Science and Its Applications—ICCSA 2014, pp. 603–613. Springer, Berlin (2014). doi:10.1007/978-3-319-09153-2_45. http://link.springer.com/chapter/10.1007/978-3-319-09153-2_45
Anderson, R., Hall, C.: Collaborating with the enemy on network management (transcript of discussion). In: Security Protocols XXII, pp. 163–171. Springer, Berlin (2014). doi:10.1007/978-3-319-12400-1_16. http://link.springer.com/chapter/10.1007/978-3-319-12400-1_16
Yeluri, R., Castro-Leon, E.: Network security in the cloud. In: Building the Infrastructure for Cloud Security, pp. 123–140. Springer, Berlin (2014). doi:10.1007/978-1-4302-6146-9_6. http://link.springer.com/chapter/10.1007/978-1-4302-6146-9_6
Clemm, A.: Network-embedded management. In: Network-Embedded Management and Applications, pp. 59–78. Springer, Berlin (2013). doi:10.1007/978-1-4419-6769-5_3. http://link.springer.com/chapter/10.1007/978-1-4419-6769-5_3
Hurel, G., Badonnel, R., Lahmadi, A., Festor, O.: Outsourcing mobile security in the cloud. In: Monitoring and Securing Virtualized Networks and Services, pp. 69–73. Springer, Berlin (2014). doi:10.1007/978-3-662-43862-6_9. http://link.springer.com/chapter/10.1007/978-3-662-43862-6_9
Ho, Q.-D., Gao, Y., Rajalingham, G., Le-Ngoc, T.: SGCN: further aspects and issues. In: Wireless Communications Networks for the Smart Grid, pp. 99–108. Springer, Berlin (2014). doi:10.1007/978-3-319-10347-1_6. http://link.springer.com/chapter/10.1007/978-3-319-10347-1_6
Zaalouk, A., Pentikousis, K.: Network configuration in OpenFlow networks. In: Mobile Networks and Management, pp. 91–104. Springer, Berlin (2015). doi:10.1007/978-3-319-16292-8_7. http://link.springer.com/chapter/10.1007/978-3-319-16292-8_7
Eckert, M., Knoll, T.M.: QoE management framework for internet services in SDN enabled mobile networks. In: Advances in Communication Networking, pp. 112–123. Springer, Berlin (2013). doi:10.1007/978-3-642-40552-5_11. http://link.springer.com/chapter/10.1007/978-3-642-40552-5_11
Wang, J., Wang, Y., Hu, H., Sun, Q., He, S., Zeng, L.: Towards a security-enhanced firewall application for OpenFlow networks. In: Cyberspace Safety and Security, pp. 92–103. Springer, Berlin (2013). doi:10.1007/978-3-319-03584-0_8. http://link.springer.com/chapter/10.1007/978-3-319-03584-0_8
Minerva, R., Manzalini, A., Moiso, C., Crespi, N.: Virtualizing network. In: Evolution of Telecommunication Services, pp. 227–256. Springer, Berlin (2013). doi:10.1007/978-3-642-41569-2_12. http://link.springer.com/chapter/10.1007/978-3-642-41569-2_12
Choi, T., Lee, B., Kang, S., Song, S., Park, H., Yoon, S., Yang, S.: IRIS-CoMan: scalable and reliable control and management architecture for SDN-enabled large-scale networks. J. Netw. Syst. Manage. 23(2), 252–279 (2015). doi:10.1007/s10922-015-9341-0. http://link.springer.com/article/10.1007/s10922-015-9341-0
Wen, H., Tiwary, P.K., Le-Ngoc, T.: Network virtualization technologies and techniques. In: Wireless Virtualization, pp. 25–40. Springer, Berlin (2013). doi:10.1007/978-3-319-01291-9_4. http://link.springer.com/chapter/10.1007/978-3-319-01291-9_4
Matsubara, D., Egawa, T., Nishinaga, N., Shin, M.-K., Kafle, V.P., Galis, A.: Open the way to future networks—a viewpoint framework from ITU-T. In: The Future Internet, pp. 27–38. Springer, Berlin (2013). doi:10.1007/978-3-642-38082-2_3. http://link.springer.com/chapter/10.1007/978-3-642-38082-2_3
Lin, P., Bi, J., Wang, Y.: East-west bridge for SDN network peering. In: Frontiers in Internet Technologies, pp. 170–181. Springer, Berlin (2013). doi:10.1007/978-3-642-53959-6_16. http://link.springer.com/chapter/10.1007/978-3-642-53959-6_16
Banjar, A., Pupatwibul, P., Braun, R.: Comparison of TCP/IP routing versus OpenFlow table and implementation of intelligent computational model to provide autonomous behavior. In: Computational Intelligence and Efficiency in Engineering Systems, pp. 121–142. Springer, Berlin (2015). doi:10.1007/978-3-319-15720-7_9. http://link.springer.com/chapter/10.1007/978-3-319-15720-7_9
Alberti, A.M.: A conceptual-driven survey on future internet requirements, technologies, and challenges. J. Braz. Comput. Soc. 19(3), 291–311 (2013). doi:10.1007/s13173-013-0101-2. http://link.springer.com/article/10.1007/s13173-013-0101-2
Derakhshan, F., Grob-Lipski, H., Roessler, H., Schefczik, P., Soellner, M.: Enabling cloud connectivity using SDN and NFV technologies. In: Mobile Networks and Management, pp. 245–258. Springer, Berlin (2013). doi:10.1007/978-3-319-04277-0_19. http://link.springer.com/chapter/10.1007/978-3-319-04277-0_19
Owezarski, P., Lobo, J., Medhi, D.: Network and service management for cloud computing and data centers: a report on CNSM 2012. J. Netw. Syst. Manage. 21(4), 707–712 (2013). doi:10.1007/s10922-013-9281-5. http://link.springer.com/article/10.1007/s10922-013-9281-5
Stewart, G.: Computational verification of network programs in Coq. In: Certified Programs and Proofs, pp. 33–49. Springer, Berlin (2013). doi:10.1007/978-3-319-03545-1_3. http://link.springer.com/chapter/10.1007/978-3-319-03545-1_3
Dobrijevic, O., Kassler, A.J., Skorin-Kapov, L., Matijasevic, M.: Q-POINT: QoE-driven path optimization model for multimedia services. In: Wired/Wireless Internet Communications, pp. 134–147. Springer, Berlin (2014). doi:10.1007/978-3-319-13174-0_11. http://link.springer.com/chapter/10.1007/978-3-319-13174-0_11
Galis, A., Rubio-Loyola, J., Clayman, S., Mamatas, L., Kukliński, S., Serrat, J., Zahariadis, T.: Software enabled future internet—challenges in orchestrating the future internet. In: Mobile Networks and Management, pp. 228–244. Springer, Berlin (2013). doi:10.1007/978-3-319-04277-0_18. http://link.springer.com/chapter/10.1007/978-3-319-04277-0_18
Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Famaey, J., Velan, P., Čeleda, P.: Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014). J. Netw. Syst. Manage. (2015). doi:10.1007/s10922-015-9346-8. http://link.springer.com/article/10.1007/s10922-015-9346-8
Gavrilovska, L., Rakovic, V., Atanasovski, V.: Visions towards 5G: technical requirements and potential enablers. Wireless Pers. Commun. (2015). doi:10.1007/s11277-015-2632-7. http://link.springer.com/article/10.1007/s11277-015-2632-7
Song, Y.J., Shin, S., Choi, Y.: Network iron curtain: hide enterprise networks with OpenFlow. In: Information Security Applications, pp. 218–230. Springer, Berlin (2014). doi:10.1007/978-3-319-05149-9_14. http://link.springer.com/chapter/10.1007/978-3-319-05149-9_14
Hall, C., Yu, D., Zhang, Z.-l., Stout, J., Odlyzko, A., Moore, A.W., Camp, J., Benton, K., Anderson, R.: Collaborating with the enemy on network management. In: Security Protocols XXII, pp. 154–162. Springer, Berlin (2014). doi:10.1007/978-3-319-12400-1_15. http://link.springer.com/chapter/10.1007/978-3-319-12400-1_15
Watashiba, Y., Date, S., Abe, H., Kido, Y., Ichikawa, K., Yamanaka, H., Kawai, E., Shimojo, S., Takemura, H.: Efficacy analysis of a SDN-enhanced resource management system through NAS parallel benchmarks. Rev. Socionetw. Strateg. 8(2), 69–84 (2014). doi:10.1007/s12626-014-0045-9. http://link.springer.com/article/10.1007/s12626-014-0045-9
Chau, N.-T., Nguyen, M.-D., Jung, S., Jung, S.: SecaaS framework and architecture: a design of dynamic packet control. In: Information Security Applications, pp. 190–201. Springer, Berlin (2015). doi:10.1007/978-3-319-15087-1_15. http://link.springer.com/chapter/10.1007/978-3-319-15087-1_15
Armando, A., Castiglione, A., Costa, G., Fiore, U., Merlo, A., Verderame, L., You, I.: Trustworthy opportunistic access to the internet of services. In: Information and Communication Technology, pp. 469–478. Springer, Berlin (2013). doi:10.1007/978-3-642-36818-9_52. http://link.springer.com/chapter/10.1007/978-3-642-36818-9_52
Tsugawa, M., Matsunaga, A., Fortes, J.A.B.: Cloud networking to support data intensive applications. In: Cloud Computing for Data-Intensive Applications, pp. 61–81. Springer, Berlin (2014). doi:10.1007/978-1-4939-1905-5_3. http://link.springer.com/chapter/10.1007/978-1-4939-1905-5_3
Lo, C.-C., Chin, H.-H., Horng, M.-F., Kuo, Y.-H., Hsu, J.-P.: A flexible network management framework based on OpenFlow technology. In: Modern Advances in Applied Intelligence, pp. 298–307. Springer, Berlin (2014). doi:10.1007/978-3-319-07467-2_32. http://link.springer.com/chapter/10.1007/978-3-319-07467-2_32
Rak, J., Pickavet, M., Trivedi, K.S., Lopez, J.A., Koster, A.M.C.A., Sterbenz, J.P.G., Çetinkaya, E.K., Gomes, T., Gunkel, M., Walkowiak, K., Staessens, D.: Future research directions in design of reliable communication systems. Telecommun. Syst. (2015). doi:10.1007/s11235-015-9987-7. http://link.springer.com/article/10.1007/s11235-015-9987-7
Maini, E., Manzalini, A.: Management and orchestration of virtualized network functions. In: Monitoring and Securing Virtualized Networks and Services, pp. 52–56. Springer, Berlin (2014). doi:10.1007/978-3-662-43862-6_6. http://link.springer.com/chapter/10.1007/978-3-662-43862-6_6
Tomovic, S., Pejanovic-Djurisic, M., Radusinovic, I.: SDN based mobile networks: concepts and benefits. Wireless Pers. Commun. 78(3), 1629–1644 (2014). doi:10.1007/s11277-014-1909-6. http://link.springer.com/article/10.1007/s11277-014-1909-6
Chen, M., Mao, S., Zhang, Y., Leung, V.C.M.: Open issues and outlook. In: Big Data, pp. 81–89. Springer, Berlin (2014). doi:10.1007/978-3-319-06245-7_7. http://link.springer.com/chapter/10.1007/978-3-319-06245-7_7
de Oliveira Silva, F., Dias, A., Ferreira, C.C., De Souza Santos, E., Pereira, F.S.F., de Andrade, I.C., de Souza Pereira, J.H., Camargos, L.J., Theodoro, L.C., Gonçalves, M.A., Pasquini, R., José, A., Neto, V., Rosa, P.F., Kofuji, S.T.: Semantically enriched services to understand the need of entities. In: The Future Internet, pp. 142–153. Springer, Berlin (2012). doi:10.1007/978-3-642-30241-1_13. http://link.springer.com/chapter/10.1007/978-3-642-30241-1_13
Benamrane, F., Mamoun, M.B., Benaini, R.: Short: a case study of the performance of an OpenFlow controller. In: Networked Systems, pp. 330–334. Springer, Berlin (2014). doi:10.1007/978-3-319-09581-3_25. http://link.springer.com/chapter/10.1007/978-3-319-09581-3_25
Antikainen, M., Aura, T., Särelä, M.: Spook in your network: attacking an SDN with a compromised OpenFlow switch. In: Secure IT Systems, pp. 229–244. Springer, Berlin (2014). doi:10.1007/978-3-319-11599-3_14. http://link.springer.com/chapter/10.1007/978-3-319-11599-3_14
Aldaya, I., Cafini, R., Cerroni, W., Raffaelli, C., Savi, M.: Optical switch emulation in programmable software router testbed. Photonic Netw. Commun. 25(1), 10–23 (2013). doi:10.1007/s11107-012-0386-7. http://link.springer.com/article/10.1007/s11107-012-0386-7
Kim, D., Gil, J.-M., Wang, G., Kim, S.-H.: Integrated SDN and non-SDN network management approaches for future internet environment. In: Multimedia and Ubiquitous Engineering, pp. 529–536. Springer, Berlin (2013). doi:10.1007/978-94-007-6738-6_64. http://link.springer.com/chapter/10.1007/978-94-007-6738-6_64
Fernandez, E.B., Monge, R., Hashizume, K.: Building a security reference architecture for cloud systems. Requir. Eng. (2015). doi:10.1007/s00766-014-0218-7. http://link.springer.com/article/10.1007/s00766-014-0218-7
Dongting, Y.: Authentication for resilience: the case of SDN (transcript of discussion). In: Security Protocols XXI, pp. 45–53. Springer, Berlin (2013). doi:10.1007/978-3-642-41717-7_7. http://link.springer.com/chapter/10.1007/978-3-642-41717-7_7
Gardiner, J., Nagaraja, S.: On the reliability of network measurement techniques used for malware traffic analysis. In: Security Protocols XXII, pp. 321–333. Springer, Berlin (2014). doi:10.1007/978-3-319-12400-1_31. http://link.springer.com/chapter/10.1007/978-3-319-12400-1_31
Zhang, S., Malik, S.: SAT based verification of network data planes. In: Automated Technology for Verification and Analysis, pp. 496–505. Springer, Berlin (2013). doi:10.1007/978-3-319-02444-8_43. http://link.springer.com/chapter/10.1007/978-3-319-02444-8_43
Kukliński, S., Wytrębowicz, J., Dinh, K.T., Tantar, E.: Application of cognitive techniques to network management and control. In: EVOLVE—A Bridge Between Probability, Set Oriented Numerics, and Evolutionary Computation V, pp. 79–93. Springer, Berlin (2014). doi:10.1007/978-3-319-07494-8_7. http://link.springer.com/chapter/10.1007/978-3-319-07494-8_7
Jafarian, J.H., Al-Shaer, E., Duan, Q.: Formal approach for route agility against persistent attackers. In: Computer Security—ESORICS 2013, pp. 237–254. Springer, Berlin (2013). doi:10.1007/978-3-642-40203-6_14. http://link.springer.com/chapter/10.1007/978-3-642-40203-6_14
Park, B., Lee, W., Kim, T.Y., Kim, H.C.: A virtualization and management architecture of micro-datacenter. In: Information Science and Applications, pp. 181–187. Springer, Berlin (2015). doi:10.1007/978-3-662-46578-3_22. http://link.springer.com/chapter/10.1007/978-3-662-46578-3_22
Bertier, M., Desprez, F., Fedak, G., Lebre, A., Orgerie, A.-C., Pastor, J., Quesnel, F., Rouzaud-Cornabas, J., Tedeschi, C.: Beyond the clouds: how should next generation utility computing infrastructures be designed? In: Cloud Computing, pp. 325–345. Springer, Berlin (2014). doi:10.1007/978-3-319-10530-7_14. http://link.springer.com/chapter/10.1007/978-3-319-10530-7_14
Alberti, A.M.: Searching for synergies among future internet ingredients. In: Convergence and Hybrid Information Technology, pp. 61–68. Springer, Berlin (2012). doi:10.1007/978-3-642-32692-9_9. http://link.springer.com/chapter/10.1007/978-3-642-32692-9_9
Seppänen, K., Kilpi, J., Suihko, T.: Integrating WMN based mobile backhaul with SDN control. Mob. Netw. Appl. 20(1), 32–39 (2015). doi:10.1007/s11036-015-0574-7. http://link.springer.com/article/10.1007/s11036-015-0574-7
Lv, G., Sun, Z., Chen, Y., Li, T.: Towards internet innovation: software defined data plane. In: Frontiers in Internet Technologies, pp. 236–247. Springer, Berlin (2013). doi:10.1007/978-3-642-53959-6_21. http://link.springer.com/chapter/10.1007/978-3-642-53959-6_21
Bozakov, Z., Sander, V.: OpenFlow: a perspective for building versatile networks. In: Network-Embedded Management and Applications, pp. 217–245. Springer, Berlin (2013). doi:10.1007/978-1-4419-6769-5_11. http://link.springer.com/chapter/10.1007/978-1-4419-6769-5_11
Kuźniar, M., Perešíni, P., Kostić, D.: What you need to know about SDN flow tables. In: Passive and Active Measurement, pp. 347–359. Springer, Berlin (2015). doi:10.1007/978-3-319-15509-8_26. http://link.springer.com/chapter/10.1007/978-3-319-15509-8_26
Yu, D., Moore, A.W., Hall, C., Anderson, R.: Authentication for resilience: the case of SDN. In: Security Protocols XXI, pp. 39–44. Springer, Berlin (2013). doi:10.1007/978-3-642-41717-7_6. http://link.springer.com/chapter/10.1007/978-3-642-41717-7_6
Fortino, G., Di Fatta, G., Pathan, M., Vasilakos, A.V.: Cloud-assisted body area networks: state-of-the-art and future challenges. Wireless Netw. 20(7), 1925–1938 (2014). doi:10.1007/s11276-014-0714-1. http://link.springer.com/article/10.1007/s11276-014-0714-1
Minerva, R., Moiso, C., Manzalini, A., Crespi, N.: Virtualizing platforms. In: Evolution of Telecommunication Services, pp. 203–226. Springer, Berlin (2013). doi:10.1007/978-3-642-41569-2_11. http://link.springer.com/chapter/10.1007/978-3-642-41569-2_11
De Turck, F., Gaspary, L.P., Betser, J., Zuckerman, D.N., Moore, T.: Managing the next wave of information and communications technologies: a report on NOMS 2012. J. Netw. Syst. Manage. 21(3), 510–516 (2013). doi:10.1007/s10922-013-9274-4. http://link.springer.com/article/10.1007/s10922-013-9274-4
Bjørner, N., Jayaraman, K.: Checking Cloud Contracts in Microsoft Azure. In: Xxxx, X. (ed.) Distributed Computing and Internet Technology, pp. 21–32. Springer, Berlin (2015). doi:10.1007/978-3-319-14977-6_2. http://link.springer.com/chapter/10.1007/978-3-319-14977-6_2
Borokhovich, M., Schmid, S.: How (not) to shoot in your foot with SDN local fast failover. In: Principles of Distributed Systems, pp. 68–82. Springer, Berlin (2013). doi:10.1007/978-3-319-03850-6_6. http://link.springer.com/chapter/10.1007/978-3-319-03850-6_6
Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., Inácio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inform. Secur. 13(2), 113–170 (2014). doi:10.1007/s10207-013-0208-7. http://link.springer.com/article/10.1007/s10207-013-0208-7
Logota, E., Saghezchi, F.B., Marques, H., Rodriguez, J.: Cooperative strategies for end-to-end energy saving and QoS control. In: Novel 3D Media Technologies, pp. 135–161. Springer, Berlin (2015). doi:10.1007/978-1-4939-2026-6_8. http://link.springer.com/chapter/10.1007/978-1-4939-2026-6_8
Schultz, G.: Security aspects and principles. In: Architecture and Design for the Future Internet, pp. 115–131. Springer, Berlin (2011). doi:10.1007/978-90-481-9346-2_6. http://link.springer.com/chapter/10.1007/978-90-481-9346-2_6
Pawar, P.S., Sajjad, A., Dimitrakos, T., Chadwick, D.W.: Security-as-a-service in multi-cloud and federated cloud environments. In: Trust Management IX, pp. 251–261. Springer, Berlin (2015). doi:10.1007/978-3-319-18491-3_21. http://link.springer.com/chapter/10.1007/978-3-319-18491-3_21
Bays, L.R., Oliveira, R.R., Barcellos, M.P., Gaspary, L.P., Madeira, E.R.M.: Virtual network security: threats, countermeasures, and challenges. J. Internet Serv. Appl. 6, 1 (2015). doi:10.1186/s13174-014-0015-z. http://link.springer.com/article/10.1186/s13174-014-0015-z
Blefari Melazzi, N., Detti, A., Pomposini, M.: Scalability measurements in an information-centric network. In: Measurement Methodology and Tools, pp. 81–106. Springer, Berlin (2013). doi:10.1007/978-3-642-41296-7_6. http://link.springer.com/chapter/10.1007/978-3-642-41296-7_6
Lee, B., Murray, N., Qiao, Y.: Active accounting and charging for programmable wireless networks. Mob. Netw. Appl. 20(1), 111–120 (2015). doi:10.1007/s11036-015-0585-4. http://link.springer.com/article/10.1007/s11036-015-0585-4
Melazzi, N.B., Andrade, T., Walker, R., Chiariglione, L., Venieris, I.S., Hussmann, H.: Conclusions and future research topics. In: Enhancing the Internet with the CONVERGENCE System, pp. 263–266. Springer, Berlin (2014). doi:10.1007/978-1-4471-5373-3_10. http://link.springer.com/chapter/10.1007/978-1-4471-5373-3_10
Ahamed, S.V., Lawrence, V.B.: The BCR view of intelligent networks (INs). In: Intelligent Broadband Multimedia Networks, pp. 229–249. Springer, Berlin (1997). doi:10.1007/978-1-4615-6341-9_9. http://link.springer.com/chapter/10.1007/978-1-4615-6341-9_9
Khasnabish, B., Huang, D., Bai, X., Bellavista, P., Martinez, G., Antonopoulos, N.: Cloud computing, networking, and services. J. Netw. Syst. Manage. 20(4), 463–467 (2012). doi:10.1007/s10922-012-9254-0. http://link.springer.com/article/10.1007/s10922-012-9254-0
Casola, V., De Benedictis, A., Albanese, M.: A multi-layer moving target defense approach for protecting resource-constrained distributed devices. In: Integration of Reusable Systems, pp. 299–324. Springer, Berlin (2014). doi:10.1007/978-3-319-04717-1_14. http://link.springer.com/chapter/10.1007/978-3-319-04717-1_14
Ma, Z., Zhang, Z.Q., Ding, Z.G., Fan, P.Z., Li, H.C.: Key techniques for 5G wireless communications: network architecture, physical layer, and MAC layer perspectives. Sci. China Inform. Sci. 58(4), 1–20 (2015). doi:10.1007/s11432-015-5293-y. http://link.springer.com/article/10.1007/s11432-015-5293-y
da Costa, F.: Small data, big data, and human interaction. In: Rethinking the Internet of Things, pp. 77–94. Springer, Berlin (2013). doi:10.1007/978-1-4302-5741-7_5. http://link.springer.com/chapter/10.1007/978-1-4302-5741-7_5
Zhou, S., Qu, Y.R., Prasanna, V.K.: Multi-core implementation of decomposition-based packet classification algorithms. In: Parallel Computing Technologies, pp. 105–119. Springer, Berlin (2013). doi:10.1007/978-3-642-39958-9_9. http://link.springer.com/chapter/10.1007/978-3-642-39958-9_9
Bhaumik, P., Thota, S., Zhangli, K., Chen, J., ElBakoury, H., Fang, L., Mukherjee, B.: On downstream transmissions in EPON Protocol over Coax (EPoC): an analysis of Coax framing approaches and other relevant considerations. Photonic Netw. Commun. 28(2), 178–189 (2014). doi:10.1007/s11107-014-0468-9. http://link.springer.com/article/10.1007/s11107-014-0468-9
Anantha Narayanan, V., Rajeswari, A., Sureshkumar, V.: Service-adaptive fuzzy multi criteria based intelligent vertical handover decision algorithm for heterogeneous wireless networks. In: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, pp. 297–304. Springer, Berlin (2015). doi:10.1007/978-81-322-2126-5_33. http://link.springer.com/chapter/10.1007/978-81-322-2126-5_33
Wen, H., Tiwary, P.K., Le-Ngoc, T.: Wireless virtualization. In: Wireless Virtualization, pp. 41–81. Springer, Berlin (2013). doi:10.1007/978-3-319-01291-9_5. http://link.springer.com/chapter/10.1007/978-3-319-01291-9_5
Dai, Q.-L., Shou, G.-C., Hu, Y.-H., Guo, Z.-G.: Performance improvement for applying network virtualization in fiber-wireless (FiWi) access networks. J. Zhejiang Univ. Sci. C 15(11), 1058–1070 (2014). doi:10.1631/jzus.C1400044. http://link.springer.com/article/10.1631/jzus.C1400044
Hiller, W., Budich, R.: Future perspectives. In: Earth System Modelling, vol. 6, pp. 79–81. Springer, Berlin (2013). doi:10.1007/978-3-642-37244-5_8. http://link.springer.com/chapter/10.1007/978-3-642-37244-5_8
Sobeslav, V., Horalek, J., Pavlik, J.: Utilization of cloud computing in education with focus on open-source technologies. In: Proceedings of the 4th International Conference on Computer Engineering and Networks, pp. 813–819. Springer, Berlin (2015). doi:10.1007/978-3-319-11104-9_94. http://link.springer.com/chapter/10.1007/978-3-319-11104-9_94
Evancich, N., Lu, Z., Li, J., Cheng, Y., Tuttle, J., Xie, P.: Network-wide awareness. In: Cyber Defense and Situational Awareness, pp. 63–91. Springer, Berlin (2014). doi:10.1007/978-3-319-11391-3_5. http://link.springer.com/chapter/10.1007/978-3-319-11391-3_5
Stephanakis, I.M., Chochliouros, I.P.: Multimedia content distribution over next-generation heterogeneous networks featuring a service architecture of sliced resources. In: Artificial Intelligence Applications and Innovations, pp. 300–310. Springer, Berlin (2012). doi:10.1007/978-3-642-33412-2_31. http://link.springer.com/chapter/10.1007/978-3-642-33412-2_31
Karame, G.O.: Towards trustworthy network measurements. In: Trust and Trustworthy Computing, pp. 83–91. Springer, Berlin (2013). doi:10.1007/978-3-642-38908-5_6. http://link.springer.com/chapter/10.1007/978-3-642-38908-5_6
Ho, Q.-D., Gao, Y., Rajalingham, G., Le-Ngoc, T.: Introduction. In: Wireless Communications Networks for the Smart Grid, pp. 1–14. Springer, Berlin (2014). doi:10.1007/978-3-319-10347-1_1. http://link.springer.com/chapter/10.1007/978-3-319-10347-1_1
Tronco, T.R., Tome, T., Rothenberg, C.E., Alberti, A.M.: New generation internet architectures: recent and ongoing projects. In: New Network Architectures, pp. 121–140. Springer, Berlin (2010). doi:10.1007/978-3-642-13247-6_6. http://link.springer.com/chapter/10.1007/978-3-642-13247-6_6
Al-Shaer, E., Duan, Q., Jafarian, J.H.: Random host mutation for moving target defense. In: Security and Privacy in Communication Networks, pp. 310–327. Springer, Berlin (2013). doi:10.1007/978-3-642-36883-7_19. http://link.springer.com/chapter/10.1007/978-3-642-36883-7_19
Huang, C., Zhu, S., Erbacher, R.: Toward software diversity in heterogeneous networked systems. In: Data and Applications Security and Privacy XXVIII, pp. 114–129. Springer, Berlin (2014). doi:10.1007/978-3-662-43936-4_8. http://link.springer.com/chapter/10.1007/978-3-662-43936-4_8
Clement, M.R., Volpano, D.: Programmable diagnostic network measurement with localization and traffic observation. In: Automated Security Management, pp. 153–167. Springer, Berlin (2013). doi:10.1007/978-3-319-01433-3_9. http://link.springer.com/chapter/10.1007/978-3-319-01433-3_9
Natal, A.R., Jakab, L., Portolés, M., Ermagan, V., Natarajan, P., Maino, F., Meyer, D., Aparicio, A.C.: LISP-MN: mobile networking through LISP. Wireless Pers. Commun. 70(1), 253–266 (2013). doi:10.1007/s11277-012-0692-5. http://link.springer.com/article/10.1007/s11277-012-0692-5
Qaisar, S.B., Ali, S., Felemban, E.A.: Wireless sensor networks in next generation communication infrastructure: vision and challenges. In: Computational Science and Its Applications—ICCSA 2014, pp. 790–803. Springer, Berlin (2014). doi:10.1007/978-3-319-09147-1_58. http://link.springer.com/chapter/10.1007/978-3-319-09147-1_58
Qu, Y.R., Zhou, S., Prasanna, V.K.: Packet classification on multi-core platforms. In: Handbook on Data Centers, pp. 425–447. Springer, Berlin (2015). doi:10.1007/978-1-4939-2092-1_13. http://link.springer.com/chapter/10.1007/978-1-4939-2092-1_13
Horsmanheimo, S., Maskey, N., Tuomimäki, L.: Interdependency between mobile and electricity distribution networks: outlook and prospects. In: Smart Device to Smart Device Communication, pp. 281–308. Springer, Berlin (2014). doi:10.1007/978-3-319-04963-2_10. http://link.springer.com/chapter/10.1007/978-3-319-04963-2_10
Pignolet, Y.A., Schmid, S., Tredan, G.: Adversarial topology discovery in network virtualization environments: a threat for ISPs? Distrib. Comput. 28(2), 91–109 (2015). doi:10.1007/s00446-014-0217-4. http://link.springer.com/article/10.1007/s00446-014-0217-4
Kushida, K.E., Murray, J., Zysman, J.: Cloud computing: from scarcity to abundance. J. Indus. Compet. Trade 15(1), 5–19 (2015). doi:10.1007/s10842-014-0188-y. http://link.springer.com/article/10.1007/s10842-014-0188-y
Lalanda, P., McCann, J.A., Diaconescu, A.: Future of autonomic computing and conclusions. In: Autonomic Computing, pp. 263–278. Springer, Berlin (2013). doi:10.1007/978-1-4471-5007-7_10. http://link.springer.com/chapter/10.1007/978-1-4471-5007-7_10
Jiang, W., Prasanna, V.K.: Network virtualization in data centers: a data plane perspective. In: Handbook on Data Centers, pp. 327–349. Springer, Berlin (2015). doi:10.1007/978-1-4939-2092-1_10. http://link.springer.com/chapter/10.1007/978-1-4939-2092-1_10
Cohen, R., Wang, T.: Intel embedded hardware platform. In: Android Application Development for the Intel® Platform, pp. 19–46. Springer, Berlin (2014). doi:10.1007/978-1-4842-0100-8_2. http://link.springer.com/chapter/10.1007/978-1-4842-0100-8_2
Bonomi, F., Milito, R., Natarajan, P., Zhu, J.: Fog computing: a platform for internet of things and analytics. In: Big Data and Internet of Things: A Roadmap for Smart Environments, pp. 169–186. Springer, Berlin (2014). doi:10.1007/978-3-319-05029-4_7. http://link.springer.com/chapter/10.1007/978-3-319-05029-4_7
Awad, M., Khanna, R.: Bioinspired computing: swarm intelligence. In: Efficient Learning Machines, pp. 105–125. Springer, Berlin (2015). doi:10.1007/978-1-4302-5990-9_6. http://link.springer.com/chapter/10.1007/978-1-4302-5990-9_6
Petcu, D.: Consuming resources and services from multiple clouds. J. Grid Computing. 12(2), 321–345 (2014). doi:10.1007/s10723-013-9290-3. http://link.springer.com/article/10.1007/s10723-013-9290-3
Sonchack, J., Aviv, A.J.: LESS is more: host-agent based simulator for large-scale evaluation of security systems. In: Computer Security—ESORICS 2014, pp. 365–382. Springer, Berlin (2014). doi:10.1007/978-3-319-11212-1_21. http://link.springer.com/chapter/10.1007/978-3-319-11212-1_21
Dongre, D., Gourav, S., Kurhekar, M.P., Deshpande, U.A., Keskar, R.B., Radke, M.A.: Scalable cloud deployment on commodity hardware using OpenStack. In: Advanced Computing, Networking and Informatics, vol. 2, pp. 415–424. Springer, Berlin (2014). doi:10.1007/978-3-319-07350-7_46. http://link.springer.com/chapter/10.1007/978-3-319-07350-7_46
Campbell, R.H., Montanari, M., Farivar, R.: A middleware for assured clouds. J. Internet Serv. Appl. 3(1), 87–94 (2012). doi:10.1007/s13174-011-0044-9. http://link.springer.com/article/10.1007/s13174-011-0044-9
Lin, G., Liu, E.: High performance network architectures for data intensive computing. In: Handbook of Data Intensive Computing, pp. 3–23. Springer, Berlin (2011). doi:10.1007/978-1-4614-1415-5_1. http://link.springer.com/chapter/10.1007/978-1-4614-1415-5_1
Janczukowicz, E., Tuffin, S., Braud, A., Bouabdallah, A., Fromentoux, G., Bonnin, J.-M.: Approaches for offering QoS and specialized traffic treatment for WebRTC. In: Advances in Communication Networking, pp. 59–69. Springer, Berlin (2014). doi:10.1007/978-3-319-13488-8_6. http://link.springer.com/chapter/10.1007/978-3-319-13488-8_6
Hahn, W., Sanneck, H.: Centralized GW control and IP address management for 3GPP networks. In: Mobile Networks and Management, pp. 13–27. Springer, Berlin (2013). doi:10.1007/978-3-642-37935-2_2. http://link.springer.com/chapter/10.1007/978-3-642-37935-2_2
Datenschutz und Datensicherheit—DuD. 39(3), 202–207 (2015). doi:10.1007/s11623-015-0394-8. http://link.springer.com/article/10.1007/s11623-015-0394-8
Zhou, S., Qu, Y.R., Prasanna, V.K.: Multi-core implementation of decomposition-based packet classification algorithms. J. Supercomput. 69(1), 34–42 (2014). doi:10.1007/s11227-014-1205-y. http://link.springer.com/article/10.1007/s11227-014-1205-y
Waschke, M.: Network and internet standards. In: Cloud Standards, pp. 199–240. Springer, Berlin (2012). doi:10.1007/978-1-4302-4111-9_9. http://link.springer.com/chapter/10.1007/978-1-4302-4111-9_9
Hwang, H., Ata, S., Murata, M.: Resource name-based routing in the network layer. J. Netw. Syst. Manage. 22(1), 1–22 (2014). doi:10.1007/s10922-012-9257-x. http://link.springer.com/article/10.1007/s10922-012-9257-x
Simmons, J.M.: Introduction to optical networks. In: Optical Network Design and Planning, pp. 1–23. Springer, Berlin (2014). doi:10.1007/978-3-319-05227-4_1. http://link.springer.com/chapter/10.1007/978-3-319-05227-4_1
Craus, M., Butincu, C.: The potential of cloud computing for analysis and finding solutions in disasters. In: Improving Disaster Resilience and Mitigation—IT Means and Tools, pp. 239–252. Springer, Berlin (2014). doi:10.1007/978-94-017-9136-6_15. http://link.springer.com/chapter/10.1007/978-94-017-9136-6_15
Ge, J., Wang, S., Wu, Y., Tang, H., Yuepeng, E.: Performance improvement for source mobility in named data networking based on global—local FIB updates. Peer-to-Peer Network. Appl. (2015). doi:10.1007/s12083-015-0353-z. http://link.springer.com/article/10.1007/s12083-015-0353-z
Lee, J., Park, M.-W., Chung, T.-M.: Path information based packet verification for authentication of SDN network manager. In: Computer Science and Its Applications, pp. 861–866. Springer, Berlin (2015). doi:10.1007/978-3-662-45402-2_122. http://link.springer.com/chapter/10.1007/978-3-662-45402-2_122
Martinez-Julia, P., Skarmeta, A.F., Galis, A.: Towards a secure network virtualization architecture for the future internet. In: The Future Internet, pp. 141–152. Springer, Berlin (2013). doi:10.1007/978-3-642-38082-2_12. http://link.springer.com/chapter/10.1007/978-3-642-38082-2_12
Cerroni, W., Raffaelli, C.: Analytical model of quality of service scheduling for optical aggregation in data centers. Photonic Netw. Commun. 28(3), 264–275 (2014). doi:10.1007/s11107-014-0449-z. http://link.springer.com/article/10.1007/s11107-014-0449-z
Ravi, A., Peddoju, S.K.: Handoff strategy for improving energy efficiency and cloud service availability for mobile devices. Wireless Pers. Commun. 81(1), 101–132 (2015). doi:10.1007/s11277-014-2119-y. http://link.springer.com/article/10.1007/s11277-014-2119-y
Ös, M.D., Bressan, G.: A community cloud for a real-time financial application—requirements, architecture and mechanisms. In: Algorithms and Architectures for Parallel Processing, pp. 364–377. Springer, Berlin (2014). doi:10.1007/978-3-319-11197-1_28. http://link.springer.com/chapter/10.1007/978-3-319-11197-1_28
Ahamed, S.V., Lawrence, V.B.: Recent American intelligent networks. In: Intelligent Broadband Multimedia Networks, pp. 152–183. Springer, Berlin (1997). doi:10.1007/978-1-4615-6341-9_6. http://link.springer.com/chapter/10.1007/978-1-4615-6341-9_6
Aßmann, J., Kiontke, A., Roller, S.: Requirements for modern network infrastructures. In: Sustained Simulation Performance 2014, pp. 141–150. Springer, Berlin (2015). doi:10.1007/978-3-319-10626-7_12. http://link.springer.com/chapter/10.1007/978-3-319-10626-7_12
Heck, A.: S. In: StarBriefs Plus, pp. 855–957. Springer, Berlin (2004). doi:10.1007/978-0-306-48603-6_19. http://link.springer.com/chapter/10.1007/978-0-306-48603-6_19
Rost, M., Schmid, S.: VirtuCast: multicast and aggregation with in-network processing. In: Principles of Distributed Systems, pp. 221–235. Springer, Berlin (2013). doi:10.1007/978-3-319-03850-6_16. http://link.springer.com/chapter/10.1007/978-3-319-03850-6_16
Terplan, K.: Integrated network management. In: Network Management and Control, pp. 31–57. Springer, Berlin (1990). doi:10.1007/978-1-4613-1471-4_4. http://link.springer.com/chapter/10.1007/978-1-4613-1471-4_4
Anderson, T., Birman, K., Broberg, R., Caesar, M., Comer, D., Cotton, C., Freedman, M.J., Haeberlen, A., Ives, Z.G., Krishnamurthy, A., Lehr, W., Loo, B.T., Mazières, D., Nicolosi, A., Smith, J.M., Stoica, I.: The NEBULA future internet architecture. In: The Future Internet, pp. 16–26. Springer, Berlin (2013). doi:10.1007/978-3-642-38082-2_2. http://link.springer.com/chapter/10.1007/978-3-642-38082-2_2
Szymanski, T.H.: Impact of future trends on exascale grid and cloud computing. In: Supercomputing, pp. 215–231. Springer, Berlin (2014). doi:10.1007/978-3-319-07518-1_14. http://link.springer.com/chapter/10.1007/978-3-319-07518-1_14
Liu, Y., Wu, J.P., Zhang, Z., Ke, X.: Research achievements on the new generation Internet architecture and protocols. Sci. China Inform. Sci. 56(11), 1–25 (2013). doi:10.1007/s11432-013-5021-4. http://link.springer.com/article/10.1007/s11432-013-5021-4
Budka, K.C., Deshpande, J.G., Thottan, M.: Future of smart grid communication networks. In: Communication Networks for Smart Grids, pp. 325–330. Springer, Berlin (2014). doi:10.1007/978-1-4471-6302-2_12. http://link.springer.com/chapter/10.1007/978-1-4471-6302-2_12
Baby Nirmala, M.: Cloud based big data analytics: WAN optimization techniques and solutions. In: Computational Intelligence for Big Data Analysis, pp. 237–254. Springer, Berlin (2015). doi:10.1007/978-3-319-16598-1_11. http://link.springer.com/chapter/10.1007/978-3-319-16598-1_11
Xu, Z.-W.: Cloud-sea computing systems: towards thousand-fold improvement in performance per watt for the coming zettabyte era. J. Comput. Sci. Technol. 29(2), 177–181 (2014). doi:10.1007/s11390-014-1420-2. http://link.springer.com/article/10.1007/s11390-014-1420-2
Ali, S.: Virtualization with KVM. In: Practical Linux Infrastructure, pp. 53–80. Springer, Berlin (2015). doi:10.1007/978-1-4842-0511-2_3. http://link.springer.com/chapter/10.1007/978-1-4842-0511-2_3
Xu, K., Zhu, M., Hu, G.W., Liang, Z., Zhong, Y.F., Liu, Y., Wu, J.P., Wang, N.: Towards evolvable Internet architecture-design constraints and models analysis. Sci. China Inform. Sci. 57(11), 1–24 (2014). doi:10.1007/s11432-014-5134-4. http://link.springer.com/article/10.1007/s11432-014-5134-4
Heck, A.: S. In: StarBriefs 2001, pp. 619–693. Springer, Berlin (2001). doi:10.1007/978-94-011-4351-6_19. http://link.springer.com/chapter/10.1007/978-94-011-4351-6_19
Geller, H.: Telecommunications policy issues: the new money delivery modes. In: Electronic Funds Transfers and Payments: The Public Policy Issues, pp. 63–78. Springer, Berlin (1987). doi:10.1007/978-94-015-7738-0_4. http://link.springer.com/chapter/10.1007/978-94-015-7738-0_4
Ahmedin, A., Pandit, K., Ghosal, D., Ghosh, A.: Exploiting scalable video coding for content aware downlink video delivery over LTE. In: Distributed Computing and Networking, pp. 423–437. Springer, Berlin (2014). doi:10.1007/978-3-642-45249-9_28. http://link.springer.com/chapter/10.1007/978-3-642-45249-9_28
Su, G., Hidell, M., Abrahamsson, H., Ahlgren, B., Li, D., Sjödin, P., Tanyingyong, V., Ke, X.: Resource management in radio access and IP-based core networks for IMT advanced and beyond. Sci. China Inform. Sci. 56(2), 1–16 (2013). doi:10.1007/s11432-012-4777-2. http://link.springer.com/article/10.1007/s11432-012-4777-2
Paolucci, F., Castro, A., Fresi, F., Imran, M., Giorgetti, A., Bhownik, B.B., Berrettini, G., Meloni, G., Cugini, F., Velasco, L., Potì, L., Castoldi, P.: Active PCE demonstration performing elastic operations and hitless defragmentation in flexible grid optical networks. Photonic Netw. Commun. 29(1), 57–66 (2015). doi:10.1007/s11107-014-0464-0. http://link.springer.com/article/10.1007/s11107-014-0464-0
Kliem, A., Renner, T.: Towards on-demand resource provisioning for IoT environments. In: Intelligent Information and Database Systems, pp. 484–493. Springer, Berlin (2015). doi:10.1007/978-3-319-15705-4_47. http://link.springer.com/chapter/10.1007/978-3-319-15705-4_47
Bodei, C., Brodo, L., Bruni, R.: Open multiparty interaction. In: Recent Trends in Algebraic Development Techniques, pp. 1–23. Springer, Berlin (2013). doi:10.1007/978-3-642-37635-1_1. http://link.springer.com/chapter/10.1007/978-3-642-37635-1_1
Zhu, J.: Computing styles. In: China Cloud Rising, pp. 41–56. Springer, Berlin (2014). doi:10.1007/978-3-642-53745-5_6. http://link.springer.com/chapter/10.1007/978-3-642-53745-5_6
Kannan, K., Banerjee, S.: Compact TCAM: flow entry compaction in TCAM for power aware SDN. In: Distributed Computing and Networking, pp. 439–444. Springer, Berlin (2013). doi:10.1007/978-3-642-35668-1_32. http://link.springer.com/chapter/10.1007/978-3-642-35668-1_32
Rothenberg, C.E.: Re-architected cloud data center networks and their impact on the future internet. In: New Network Architectures, pp. 179–187. Springer, Berlin (2010). doi:10.1007/978-3-642-13247-6_10. http://link.springer.com/chapter/10.1007/978-3-642-13247-6_10
Ahamed, S.V., Lawrence, V.B.: Networks and the information society. In: Intelligent Broadband Multimedia Networks, pp. 60–93. Springer, Berlin (1997). doi:10.1007/978-1-4615-6341-9_3. http://link.springer.com/chapter/10.1007/978-1-4615-6341-9_3
Chatterjee, P., Ghosh, U., Sengupta, I., Ghosh, S.K.: A trust enhanced secure clustering framework for wireless ad hoc networks. Wireless Netw. 20(7), 1669–1684 (2014). doi:10.1007/s11276-014-0701-6. http://link.springer.com/article/10.1007/s11276-014-0701-6
Detti, A., Salsano, S., Melazzi, N.B.: The network level (CONET). In: Enhancing the Internet with the CONVERGENCE System, pp. 49–72. Springer, Berlin (2014). doi:10.1007/978-1-4471-5373-3_3. http://link.springer.com/chapter/10.1007/978-1-4471-5373-3_3
Monserrat, J.F., Mange, G., Braun, V., Tullberg, H., Zimmermann, G., Bulakci, Ö.: METIS research advances towards the 5G mobile and wireless system definition. EURASIP J. Wireless Commun. Network. (2015). doi:10.1186/s13638-015-0302-9. http://link.springer.com/article/10.1186/s13638-015-0302-9
Fragkiadakis, A., Askoxylakis, I., Chatziadam, P.: Denial-of-service attacks in wireless networks using off-the-shelf hardware. In: Distributed, Ambient, and Pervasive Interactions, pp. 427–438. Springer, Berlin (2014). doi:10.1007/978-3-319-07788-8_40. http://link.springer.com/chapter/10.1007/978-3-319-07788-8_40
Joel Jr., A.E.: Communication switching architectures for business, industry, and government. In: Fundamentals of Digital Switching, pp. 429–446. Springer, Berlin (1990). doi:10.1007/978-1-4684-9880-6_11. http://link.springer.com/chapter/10.1007/978-1-4684-9880-6_11
Vlietstra, J.: S. In: Dictionary of Acronyms and Technical Abbreviations, pp. 538–604. Springer, Berlin (1997). doi:10.1007/978-1-4471-3396-4_19. http://link.springer.com/chapter/10.1007/978-1-4471-3396-4_19
Klein, D., Zinner, T., Borchert, K., Lange, S., Singeorzan, V., Schmid, M.: Evaluation of video quality monitoring based on pre-computed frame distortions. In: Advances in Communication Networking, pp. 100–111. Springer, Berlin (2013). doi:10.1007/978-3-642-40552-5_10. http://link.springer.com/chapter/10.1007/978-3-642-40552-5_10
Vlietstra, J.: S. In: Dictionary of Acronyms and Technical Abbreviations, pp. 545–610. Springer, Berlin (2001). doi:10.1007/978-1-4471-0263-2_19. http://link.springer.com/chapter/10.1007/978-1-4471-0263-2_19
Hong, J.W.-K., Yuan-Kuang, T., Hong, C.S., Tseng, S.-S., Kiriha, Y., Chao, H.-C., Zhanikeev, M., Song, W.-C.: Managing clouds, smart networks and services: a report on APNOMS 2011. J. Netw. Syst. Manage. 20(1), 134–142 (2012). doi:10.1007/s10922-011-9221-1. http://link.springer.com/article/10.1007/s10922-011-9221-1
Fang, Y.-C., Gao, Y., Stap, C.: Future enterprise computing looking into 2020. In: Frontier and Innovation in Future Computing and Communications, pp. 127–134. Springer, Berlin (2014). doi:10.1007/978-94-017-8798-7_16. http://link.springer.com/chapter/10.1007/978-94-017-8798-7_16
Kannan, K., Banerjee, S.: FlowMaster: early eviction of dead flow on SDN switches. In: Distributed Computing and Networking, pp. 484–498. Springer, Berlin (2014). doi:10.1007/978-3-642-45249-9_32. http://link.springer.com/chapter/10.1007/978-3-642-45249-9_32
Tong, X.C.: Perspectives and future trends. In: Advanced Materials for Integrated Optical Waveguides, pp. 509–543. Springer, Berlin (2014). doi:10.1007/978-3-319-01550-7_12. http://link.springer.com/chapter/10.1007/978-3-319-01550-7_12
Zhang, S., Malik, S., McGeer, R.: Verification of computer switching networks: an overview. In: Automated Technology for Verification and Analysis, pp. 1–16. Springer, Berlin (2012). doi:10.1007/978-3-642-33386-6_1. http://link.springer.com/chapter/10.1007/978-3-642-33386-6_1
daCosta, F.: It’s different out here. In: Rethinking the Internet of Things, pp. 1–21. Springer, Berlin (2013). doi:10.1007/978-1-4302-5741-7_1. http://link.springer.com/chapter/10.1007/978-1-4302-5741-7_1
Elmallah, E.S., Acharya, H.B., Gouda, M.G.: Incremental verification of computing policies. In: Stabilization, Safety, and Security of Distributed Systems, pp. 226–236. Springer, Berlin (2014). doi:10.1007/978-3-319-11764-5_16. http://link.springer.com/chapter/10.1007/978-3-319-11764-5_16
Huang, W.: The development of cloud computing in pacific rim. In: Web Services and Formal Methods, pp. 3–12. Springer, Berlin (2014). doi:10.1007/978-3-319-08260-8_1. http://link.springer.com/chapter/10.1007/978-3-319-08260-8_1
Astorga, J., Jacob, E., Toledo, N., Aguado, M., Higuero, M.: A lossy channel aware parameterisation of a novel security protocol for wireless IP-enabled sensors. Wireless Netw. 21(4), 1289–1308 (2015). doi:10.1007/s11276-014-0854-3. http://link.springer.com/article/10.1007/s11276-014-0854-3
Antonenko, V.A., Smelyanskiy, R.L.: Simulation of malicious activity in wide area networks. Program. Comput. Softw. 39(1), 25–33 (2013). doi:10.1134/S0361768813010027. http://link.springer.com/article/10.1134/S0361768813010027
Corradi, A., Fanelli, M., Foschini, L.: Management infrastructures for power-efficient cloud computing architectures. In: Cloud Computing, pp. 133–152. Springer, Berlin (2013). doi:10.1007/978-1-4471-5107-4_7. http://link.springer.com/chapter/10.1007/978-1-4471-5107-4_7
Kumaran, S.: A perspective of the cellular network of the future: cloud-RAN. In: Afro-European Conference for Industrial Advancement, pp. 27–41. Springer, Berlin (2015). doi:10.1007/978-3-319-13572-4_3. http://link.springer.com/chapter/10.1007/978-3-319-13572-4_3
Liang, J., Lin, Z., Ma, Y.: OF-NEDL: an OpenFlow networking experiment description language based on XML. In: Web Information Systems and Mining, pp. 686–697. Springer, Berlin (2012). doi:10.1007/978-3-642-33469-6_85. http://link.springer.com/chapter/10.1007/978-3-642-33469-6_85
Ardagna, C.A., Damiani, E.: Network and storage latency attacks to online trading protocols in the cloud. In: On the Move to Meaningful Internet Systems: OTM 2014 Workshops, pp. 192–201. Springer, Berlin (2014). doi:10.1007/978-3-662-45550-0_20. http://link.springer.com/chapter/10.1007/978-3-662-45550-0_20
Nikolik, D.: Wide area networks. In: A Manager’s Primer on e-Networking, pp. 163–180. Springer, Berlin (2003). doi:10.1007/978-94-007-0862-4_11. http://link.springer.com/chapter/10.1007/978-94-007-0862-4_11
Industriegipfel Feldafing—System Leadership 2030“—ein Resümee erster Strategiegespräche zu Industrie 4.0. Informatik-Spektrum. 37(1), 54–72 (2014). doi:10.1007/s00287-013-0763-3. http://link.springer.com/article/10.1007/s00287-013-0763-3
Yu, C., Lumezanu, C., Zhang, Y., Singh, V., Jiang, G., Madhyastha, H.V.: FlowSense: monitoring network utilization with zero measurement cost. In: Passive and Active Measurement, pp. 31–41. Springer, Berlin (2013). doi:10.1007/978-3-642-36516-4_4. http://link.springer.com/chapter/10.1007/978-3-642-36516-4_4
Shu, L., Zhang, Y., Chen, X., Wang, S.: Editorial for special issue on industrial networks and intelligent systems. Mob. Netw. Appl. 20(2), 121–123 (2015). doi:10.1007/s11036-015-0594-3. http://link.springer.com/article/10.1007/s11036-015-0594-3
Gifre, L., Paolucci, F., Aguado, A., Casellas, R., Castro, A., Cugini, F., Castoldi, P., Velasco, L., López, V.: Experimental assessment of in-operation spectrum defragmentation. Photonic Netw. Commun. 27(3), 128–140 (2014). doi:10.1007/s11107-014-0433-7. http://link.springer.com/article/10.1007/s11107-014-0433-7
Ahamed, S.V., Lawrence, V.B.: Optical lightwave systems in existing networks. In: Design and Engineering of Intelligent Communication Systems, pp. 559–593. Springer, Berlin (1997). doi:10.1007/978-1-4615-6291-7_17. http://link.springer.com/chapter/10.1007/978-1-4615-6291-7_17
Stiller, B., Hausheer, D., Hoßfeld, T.: Towards a socially-aware management of new overlay application traffic combined with energy efficiency in the internet (SmartenIT). In: The Future Internet, pp. 3–15. Springer, Berlin (2013). doi:10.1007/978-3-642-38082-2_1. http://link.springer.com/chapter/10.1007/978-3-642-38082-2_1
Ahamed, S.V., Lawrence, V.B.: Current digital networks. In: Design and Engineering of Intelligent Communication Systems, pp. 85–122. Springer, Berlin (1997). doi:10.1007/978-1-4615-6291-7_4. http://link.springer.com/chapter/10.1007/978-1-4615-6291-7_4
Togawa, S., Kanenishi, K.: Private cloud collaboration framework for e-learning environment for disaster recovery using smartphone alert notification. In: Human Interface and the Management of Information. Information and Knowledge in Applications and Services, pp. 118–126. Springer, Berlin (2014). doi:10.1007/978-3-319-07863-2_13. http://link.springer.com/chapter/10.1007/978-3-319-07863-2_13
Ahamed, S.V., Lawrence, V.B.: Advanced intelligent networks (AINs). In: Intelligent Broadband Multimedia Networks, pp. 318–336. Springer, Berlin (1997). doi:10.1007/978-1-4615-6341-9_13. http://link.springer.com/chapter/10.1007/978-1-4615-6341-9_13
Togawa, S., Kanenishi, K.: Private cloud cooperation framework for reducing the earthquake damage on e-learning environment. In: Human-Computer Interaction. Applications and Services, pp. 503–510. Springer, Berlin (2013). doi:10.1007/978-3-642-39262-7_57. http://link.springer.com/chapter/10.1007/978-3-642-39262-7_57
Wagh, A., Hou, Y., Qiao, C., Zhang, L., Xu, L., Sadek, A., Hulme, K., Wu, C., Xu, H.-L., Huang, L.-S.: Emerging applications for cyber transportation systems. J. Comput. Sci. Technol. 29(4), 562–575 (2014). doi:10.1007/s11390-014-1450-9. http://link.springer.com/article/10.1007/s11390-014-1450-9
Santos, M.A.S., Porras, D.E.T., Silveira, R.M., Margi, C.B.: Multipath source routing strategies for video transmission in ad hoc wireless networks. Wireless Netw. 21(3), 859–869 (2015). doi:10.1007/s11276-014-0823-x. http://link.springer.com/article/10.1007/s11276-014-0823-x
Chowdhury, S.R., Roy, A.R., Shaikh, M., Daudjee, K.: A taxonomy of decentralized online social networks. Peer-to-Peer Network. Appl. 8(3), 367–383 (2015). doi:10.1007/s12083-014-0258-2. http://link.springer.com/article/10.1007/s12083-014-0258-2
Yoon, S., Lee, S.S., Kim, S.-H.: Robust mutual trust architecture for safety critical service in heterogeneous mobile network environment. Telecommun. Syst. (2015). doi:10.1007/s11235-015-0029-2. http://link.springer.com/article/10.1007/s11235-015-0029-2
Said Seddiki, M., Frikha, M., Song, Y.-Q.: A non-cooperative game-theoretic framework for resource allocation in network virtualization. Telecommun. Syst. (2015). doi:10.1007/s11235-015-9995-7. http://link.springer.com/article/10.1007/s11235-015-9995-7
Zinner, T., Hoßfeld, T., Fiedler, M., Liers, F., Volkert, T., Khondoker, R., Schatz, R.: Requirement driven prospects for realizing user-centric network orchestration. Multimedia Tools Appl. 74(2), 413–437 (2015). doi:10.1007/s11042-014-2072-5. http://link.springer.com/article/10.1007/s11042-014-2072-5
Zhao, D., Wu, C., Hu, X., Liu, H.: LSC2: an extended link state protocol with centralized control. Peer-to-Peer Network. Appl. (2013). doi:10.1007/s12083-013-0226-2. http://link.springer.com/article/10.1007/s12083-013-0226-2
Kitamura, M., Kimiyama, H., Ogura, T., Fujii, T.: A basic study on high bandwidth streaming in realtime over multipath using LDPC-IRA codes. In: Internet and Distributed Computing Systems, pp. 217–226. Springer, Berlin (2014). doi:10.1007/978-3-319-11692-1_19. http://link.springer.com/chapter/10.1007/978-3-319-11692-1_19
Bayzelon, G., Yang, S., Xu, M., Li, Q.: Multi-dimensional forwarding tables. In: Frontiers in Internet Technologies, pp. 68–79. Springer, Berlin (2015). doi:10.1007/978-3-662-46826-5_6. http://link.springer.com/chapter/10.1007/978-3-662-46826-5_6
Aguiar, E., Riker, A., Cerqueira, E., Antônio Abelém, M.M., Braun, T., Curado, M., Zeadally, S.: A real-time video quality estimator for emerging wireless multimedia systems. Wireless Netw. 20(7), 1759–1776 (2014). doi:10.1007/s11276-014-0709-y. http://link.springer.com/article/10.1007/s11276-014-0709-y
Sousa, B., Marques, C., Palma, D., Gonçalves, J., Simões, P., Bohnert, T., Cordeiro, L.: Towards a high performance DNSaaS deployment. In: Mobile Networks and Management, pp. 77–90. Springer, Berlin (2015). doi:10.1007/978-3-319-16292-8_6. http://link.springer.com/chapter/10.1007/978-3-319-16292-8_6
Trestian, R., Ormond, O., Muntean, G.-M.: Performance evaluation of MADM-based methods for network selection in a multimedia wireless environment. Wireless Netw. (2014). doi:10.1007/s11276-014-0882-z. http://link.springer.com/article/10.1007/s11276-014-0882-z
Haileselassie Hagos, D.: The performance of network-controlled mobile data offloading from LTE to WiFi networks. Telecommun. Syst. (2015). doi:10.1007/s11235-015-0061-2. http://link.springer.com/article/10.1007/s11235-015-0061-2
Ju, H., Hong, C.S., Takano, M., Yoo, J.-H., Chang, K.-Y., Yoshihara, K., Jeng, J.-Y.: Management in the big data & IoT era: a report on APNOMS 2012. J. Netw. Syst. Manage. 21(3), 517–524 (2013). doi:10.1007/s10922-013-9270-8. http://link.springer.com/article/10.1007/s10922-013-9270-8
Al-Maqri, M.A., Mohamed, O., Mohd Ali, B., Mohd Hanapi, Z.: Adaptive multi-polling scheduler for QoS support of video transmission in IEEE 802.11e WLANs. Telecommun. Syst. (2015). doi:10.1007/s11235-015-0020-y. http://link.springer.com/article/10.1007/s11235-015-0020-y
Sedef Savas, S., Ferhat, D., Farhan Habib, M., Tornatore, M., Mukherjee, B.: Disaster-aware service provisioning with manycasting in cloud networks. Photonic Netw. Commun. 28(2), 123–134 (2014). doi:10.1007/s11107-014-0457-z. http://link.springer.com/article/10.1007/s11107-014-0457-z
Li, L., Xu, X., Wang, J., Wang, W.: DS2: a DHT-based substrate for distributed services. Peer-to-Peer Network. Appl. 6(4), 380–396 (2013). doi:10.1007/s12083-013-0228-0. http://link.springer.com/article/10.1007/s12083-013-0228-0
Jiang, J.-R., Wu, J.-W., Fan, C.-W., Jie-Yi, W.: Immersive voice communication for massively multiplayer online games. Peer-to-Peer Network. Appl. (2014). doi:10.1007/s12083-014-0312-0. http://link.springer.com/article/10.1007/s12083-014-0312-0
Tarasiuk, H., Hanczewski, S., Kaliszan, A., Szuman, R., Ogrodowczyk, Ł., Olszewski, I., Giertych, M., Wiśniewski, P.: The IPv6 QoS system implementation in virtual infrastructure. Telecommun. Syst. (2015). doi:10.1007/s11235-015-9996-6. http://link.springer.com/article/10.1007/s11235-015-9996-6
Abdeljaouad, I., Karmouch, A.: A game-theoretic approach for dynamic and adaptive managers selection in service specific overlay networks. J. Netw. Syst. Manage. (2014). doi:10.1007/s10922-014-9316-6. http://link.springer.com/article/10.1007/s10922-014-9316-6
Liu, Y., Chen, W.: Multicast storage and forwarding method for distributed router. In: Frontiers in Internet Technologies, pp. 106–117. Springer, Berlin (2015). doi:10.1007/978-3-662-46826-5_9. http://link.springer.com/chapter/10.1007/978-3-662-46826-5_9
Javaid, N., Ahmad, A., Khan, Y., Khan, Z.A., Alghamdi, T.A.: A relay based routing protocol for wireless in-body sensor networks. Wireless Pers. Commun. 80(3), 1063–1078 (2015). doi:10.1007/s11277-014-2071-x. http://link.springer.com/article/10.1007/s11277-014-2071-x
Li, J., Zeng, W., Arora, A.: The configuration space of duty-cycled CSMA-based wireless MACs. Wireless Netw. 20(8), 2561–2579 (2014). doi:10.1007/s11276-014-0750-x. http://link.springer.com/article/10.1007/s11276-014-0750-x
Alsmadi, I.: the integration of access control levels based on SDN. Int. J. High Perform. Comput. Network. (2016). doi:10.1504/IJHPCN.2016.077820
Aleroud, A., Alsmadi, I.: Identifying DoS attacks on software defined networks: a relation context approach. NOMS (2016)
Alsmadi, I., Munakami, M., Xu, D.: Model-based testing of SDN firewalls: a case study. In: Proceedings of The Second International Conference on Trustworthy Systems and Their Applications, (TSA’15), Taiwan, July 2015
Alsmadi, I., Xu, D.: Security of software defined networks: a survey. Comput. Secur. 53, 79–108 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Alsmadi, I.M., Zarour, M. (2017). Empirical Evidences in Software-Defined Network Security: A Systematic Literature Review. In: Alsmadi, I., Karabatis, G., Aleroud, A. (eds) Information Fusion for Cyber-Security Analytics. Studies in Computational Intelligence, vol 691. Springer, Cham. https://doi.org/10.1007/978-3-319-44257-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-44257-0_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44256-3
Online ISBN: 978-3-319-44257-0
eBook Packages: EngineeringEngineering (R0)