[2]
Kreutz D, Ramos F, Verissimo P. Towards secure and dependable software-defined networks. Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software defined Networking. Hong Kong, China.
[4]
Fayaz SK, Tobioka Y, Sekar V. Flexible and elastic DDoS defense. Proceedings of the 24th USENIX Security Symposium. Washington, DC. 2015.
[6]
Liu S. Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education. J Netw Comput Appl 2017; 88(15): 1-9.
[8]
Tarek SS, Elgohary A, Zaki M. Performance improvements on the network security protocols. Int J Netw Secur 2008; 6(1): 103-15.
[11]
Dhawan M, Poddar R, Mahajan K. SPHINX: Detecting security
attacks in software-defined networks. Proceedings of the 2015
Network and Distributed System Security (NDSS) Symposium,
San Diego, California, USA..
[12]
Lochan VB, Gupta NK. Dynamic business model outsourcing for data integrity in clouds. Int J Curr Eng Technol 2015; 5(2): 935-41.
[14]
Rebecchi F, Boite J, Nardin P, Bouet M, Conan V. Traffic monitoring and DDoS detection using stateful SDN Network Softwarization (NetSoft). 2017 IEEE Conference on IEEE, Bologna, Italy..
[15]
Farag IA, Shouman MA, Sobh TS, El-Fiqi HZ. Intelligent system for worm detection. Int Arab J E-Technol 2009; 1: 58-67.
[16]
Chen CC, Chen YR, Lu WC, Tsai SC, Yang MC. Detecting amplification attacks with software defined networking.2017 IEEE Conference on Dependable and Secure Computing. Taipei, Taiwan.
[17]
Chen C, Cui YY. New method of energy efficient subcarrier allocation based on evolutionary game theory. Mob Netw Appl 2018; 2018: 9.
[18]
D’Cruze H, Wang P, Sbeit RO, Ray A. A Software-Defined Networking (SDN) approach to mitigating DDoS attacks information technology - New generation’s advances in intelligent systems and computing. Cham: Springer 2018; Vol. 558.
[20]
Zhang D, Ge H. New multi-hop clustering algorithm for vehicular Ad Hoc networks. IEEE Trans Intell Transp Syst 2018; 2018: 7.
[22]
Gao J. Novel approach of distributed & adaptive trust metrics for MANET. Wirel Netw 2019; 2019: 1.
[23]
Shin S, Porras P, Yegneswaran V, Fong M, Gu G, Tyson M. FRESCO: Modular composable security services for soft-ware-defined networks. Proceedings of the 20th Annual Network Distributed System Security Symposium (NDSS’13). San Diego, CA, USA. 2013.
[24]
Shin S, Yegneswaran V, Porras P, Gu G. AVANT-GUARD: Scalable and vigilant switch flow management in software-defined
networks. CCS '13 Proceedings of the 2013 ACM SIGSAC conference on computer communications security, Berlin, Germany..
[25]
Shin S, Gu G. Attacking software-defined networks: A first feasibility study. Proceedings of the second ACM SIGCOMM workshop on hot topics in software defined networking. Hong Kong, China. 2013.
[26]
Liu J, Lai Y, Zhang S. FL-GUARD: A detection and defense system for DDoS Attack International Conference on Cryptography, Security and Privacy. ICCSP '17: Proceedings of the 2017. International Conference on Cryptography, Security and Privacy.
[28]
Porras P, Shin S, Yegneswaran V, Fong M, Tyson M, Gu G. Security enforcement kernel for openflow networks. HotSDN’12 Proceedings of the first workshop on Hot topics in software defined
networks, Helsinki, Finland, 2012.
[29]
Kazemian P, Varghese G, McKeown N. Header space analysis: Static checking for networks. Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI’12). San Jose, CA, USA.
[30]
Kazemian P, Chang M, Zeng H, Varghese G, McKeown N, Whyte S. Real time network policy checking using header space analysis. Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI’13), Lombard, IL (near Chicago), USA..
[31]
Khurshid A, Zou X, Zhou W, Caesar M, Godfrey PB. VeriFlow:
Verifying Network-wide Invariants in Real Time. USENIX, Chicago, IL, Illinois..
[32]
Hong S, Xu L, Wang H, Gu G. Chapter 8.2.2 of the book “Network
security: Current status and future direction. Copyright © 2007 by
the Institute of Electrical and Electronics Engineers, Inc All rights
reserved. Published by John Wiley Sons, Inc., Published simultaneously in Canada, 2007.
[33]
Douligeris C, Serpanos DN. Chapter 8.2.2 of the book “Network
Security: Current Status and Future DirectionCopyright © 2007 by
the Institute of Electrical and Electronics Engineers, Inc All rights
reserved. Published by John Wiley Sons, Inc., Published simultaneously in Canada, 2007.
[35]
Kollar D, Friedman N. Probabilistic Graphical Models: Princi-ples and Techniques. London, Massachusetts, England: The MIT Press Cambridge 2009.
[36]
Chow C, Liu C. Approximating discrete probability distributions with dependence trees. IEEE Trans Inf Theory 1968; 14(3): 462-7.
[37]
Murphy KP. Machine Learning: A Probabilistic Perspective the MIT Press 2012.
[39]
Lantz B, Heller B, McKeown N. A network in a laptop: Rapid prototyping for software-defined networks. 9th ACM SIGCOMM Workshop on Hot Topics in Networks Monterey. California, USA. 2010.