Academic literature on the topic 'SDN Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SDN Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SDN Security"
Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.
Full textEom, Taehoon, Jin B. Hong, SeongMo An, Jong Sou Park, and Dong Seong Kim. "A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models." Security and Communication Networks 2020 (February 18, 2020): 1–15. http://dx.doi.org/10.1155/2020/7235043.
Full textDas, Souvik, and Kamil Sarac. "Practical Labs for Teaching SDN Security." Journal of The Colloquium for Information Systems Security Education 10, no. 1 (2023): 7. http://dx.doi.org/10.53735/cisse.v10i1.166.
Full textLam, JunHuy, Sang-Gon Lee, Hoon-Jae Lee, and Yustus Eko Oktian. "Securing SDN Southbound and Data Plane Communication with IBC." Mobile Information Systems 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/1708970.
Full textJo, Hyeonseong, Jaehyun Nam, and Seungwon Shin. "NOSArmor: Building a Secure Network Operating System." Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/9178425.
Full textYu, Yang, Yu Nan Wang, and Wei Yang. "Security Framework Based on SDN." Advanced Materials Research 989-994 (July 2014): 4690–93. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4690.
Full textJose, Teenu, and Jincy Kurian. "Survey on SDN Security Mechanisms." International Journal of Computer Applications 132, no. 14 (2015): 32–35. http://dx.doi.org/10.5120/ijca2015907602.
Full textFu, Wenwen, Tao Li, and Zhigang Sun. "FAS: Using FPGA to Accelerate and Secure SDN Software Switches." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/5650205.
Full textSavytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev, and Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK." Information technology and computer engineering 58, no. 3 (2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.
Full textTapiero, Robin. "Security in SDN networks and their applications." Ingeniería Solidaria 17, no. 2 (2021): 1–25. http://dx.doi.org/10.16925/2357-6014.2021.02.09.
Full textDissertations / Theses on the topic "SDN Security"
Abou, El Houda Zakaria. "Security Enforcement through Software Defined Networks (SDN)." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0023.
Full textRivera, Polanco Sergio A. "AUTOMATED NETWORK SECURITY WITH EXCEPTIONS USING SDN." UKnowledge, 2019. https://uknowledge.uky.edu/cs_etds/87.
Full textLejaha, Retselisitsoe. "SDN based security solutions for multi-tenancy NFV." Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/24474.
Full textFaizan, Shah Ali. "SDN based security using cognitive algorithm against DDOS." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29880.
Full textKodzai, Carlton. "Impact of network security on SDN controller performance." Master's thesis, University of Cape Town, 2020. http://hdl.handle.net/11427/32514.
Full textStagkopoulou, Alexandra. "Simulative Evaluation of Security Monitoring Systems based on SDN." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193710.
Full textBOERO, LUCA. "Advanced SDN-Based QoS and Security Solutions for Heterogeneous Networks." Doctoral thesis, Università degli studi di Genova, 2019. http://hdl.handle.net/11567/940881.
Full textYUSUPOV, JALOLLIDDIN. "Formal assurance of security policies in automated network orchestration (SDN/NFV)." Doctoral thesis, Politecnico di Torino, 2020. http://hdl.handle.net/11583/2850616.
Full textRossi, Mattia. "Software Defined Security: il futuro della sicurezza in rete." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textPattaranantakul, Montida. "Moving towards software-defined security in the era of NFV and SDN." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL009/document.
Full textBooks on the topic "SDN Security"
Khondoker, Rahamatullah, ed. SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6.
Full textZhu, Shao Ying, Sandra Scott-Hayward, Ludovic Jacquin, and Richard Hill, eds. Guide to Security in SDN and NFV. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64653-4.
Full textAmanowicz, Marek, Sebastian Szwaczyk, and Konrad Wrona. Data-Centric Security in Software Defined Networks (SDN). Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-55517-6.
Full textM, Rajcsanyi Peter, and Bilandžić Vladimir 1946-, eds. SDI and European security. Institute for East-West Security Studies, 1987.
Find full textRowny, Edward L. SDI, enhancing security and stability. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Find full textRowny, Edward L. SDI, enhancing security and stability. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Find full textRowny, Edward L. SDI, enhancing security and stability. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Find full textAtlantic Institute for International Affairs., ed. The SDI and European security interests. Croom Helm for the Atlantic Institute for International Affairs, 1987.
Find full textServices, American Bar Association Committee on Commercial Financial. Committee on Commercial Financial Services, October 24, 2001, San Francisco Marriott, San Francisco, CA. American Bar Association, 2001.
Find full textBook chapters on the topic "SDN Security"
Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "SDN and NFV Security." In Software-Defined Networking and Security. CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-6.
Full textAttili, Venkata Ramana, Sreenivasa Rao Annaluri, and V. S. Podili Srinivas. "Security Issues in SDN." In Software-Defined Networking for Future Internet Technology. Apple Academic Press, 2021. http://dx.doi.org/10.1201/9781003145721-1.
Full textde Freitas, Miguel Borges, Luis Rosa, Tiago Cruz, and Paulo Simões. "SDN-Enabled Virtual Data Diode." In Computer Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2_7.
Full textHuang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "SDN and NFV." In Software-Defined Networking and Security. CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-4.
Full textSagare, Anagha Anilkumar, and Rahamatullah Khondoker. "Security Analysis of SDN Routing Applications." In SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6_1.
Full textChikhale, Ankush, and Rahamatullah Khondoker. "Security Analysis of SDN Cloud Applications." In SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6_2.
Full textAhmad, Parvez, Sven Jacob, and Rahamatullah Khondoker. "Security Analysis of SDN Applications for Big Data." In SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6_3.
Full textArtmann, David, and Rahamatullah Khondoker. "Security Analysis of SDN WiFi Applications." In SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6_4.
Full textLippert, Timm, and Rahamatullah Khondoker. "Security Analysis for the Middleware Assurance Substrate." In SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6_5.
Full textIlyas, Qamar, and Rahamatullah Khondoker. "Security Analysis of FloodLight, ZeroSDN, Beacon and POX SDN Controllers." In SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6_6.
Full textConference papers on the topic "SDN Security"
Latah, Majd, and Kubra Kalkan. "SDN-API-Sec: A Conflict-Free BC-Based Authorization for Cross-Domain SDNs." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851743.
Full textYalda, Khirota Gorgees, Diyar Jamal Hamad, Nicolae Tapus, and Ibrahim Taner Okumus. "Security Issues in Software-Defined Networking (SDN) Environments." In 2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2024. http://dx.doi.org/10.1109/roedunet64292.2024.10722112.
Full textZerifi, Manare, Abdellatif Ezzouhairi, and Abdelhak Boulaalam. "SDN and NFV security approaches for IoT environments." In 2024 3rd International Conference on Embedded Systems and Artificial Intelligence (ESAI). IEEE, 2024. https://doi.org/10.1109/esai62891.2024.10913860.
Full textK, Shyampradeep, Amith R. Telgar, and K. Saraswathi. "Enhancement of SDN Packet Security Using Quantum Keys." In 2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT). IEEE, 2025. https://doi.org/10.1109/idciot64235.2025.10915048.
Full textScott-Hayward, Sandra, Gemma O'Callaghan, and Sakir Sezer. "Sdn Security: A Survey." In 2013 IEEE SDN for Future Networks and Services (SDN4FNS). IEEE, 2013. http://dx.doi.org/10.1109/sdn4fns.2013.6702553.
Full textSmeliansky, R. L. "SDN for network security." In 2014 International Science and Technology Conference (Modern Networking Technologies) (MoNeTeC). IEEE, 2014. http://dx.doi.org/10.1109/monetec.2014.6995602.
Full textAneci, Mihai-Nicolae, Laura Gheorghe, Mihai Carabas, Stefan Soriga, and Raluca-Andreea Somesan. "SDN-based security mechanism." In 2015 14th RoEduNet International Conference - Networking in Education and Research (RoEduNet NER). IEEE, 2015. http://dx.doi.org/10.1109/roedunet.2015.7311820.
Full textAgeyev, Dmytro, Oleg Bondarenko, Walla Alfroukh, and Tamara Radivilova. "Provision security in SDN/NFV." In 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET). IEEE, 2018. http://dx.doi.org/10.1109/tcset.2018.8336252.
Full textBaidya, Sonali Sen, and Rattikorn Hewett. "SDN-based edge computing security." In SEC '19: The Fourth ACM/IEEE Symposium on Edge Computing. ACM, 2019. http://dx.doi.org/10.1145/3318216.3363374.
Full textCox, Jacob H., Russell J. Clark, and Henry L. Owen. "Leveraging SDN for ARP security." In SoutheastCon 2016. IEEE, 2016. http://dx.doi.org/10.1109/secon.2016.7506644.
Full textReports on the topic "SDN Security"
Yu, Dongting, Andrew W. Moore, Chris Hall, and Ross Anderson. Security: a Killer App for SDN? Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada613601.
Full textRowny, Edward L. SDI: Enhancing Security and Stability. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada351518.
Full textAndreasen, F., M. Baugher, and D. Wing. Session Description Protocol (SDP) Security Descriptions for Media Streams. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4568.
Full textAndreasen, F., and D. Wing. Security Preconditions for Session Description Protocol (SDP) Media Streams. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc5027.
Full textHolmberg, C., and R. Shpount. Session Description Protocol (SDP) Offer/Answer Considerations for Datagram Transport Layer Security (DTLS) and Transport Layer Security (TLS). RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8842.
Full textDinkel, Charles. Secure data network system (SDNS) network, transport, and message security protocols. National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.90-4250.
Full textJansen, Wayne A. A formal description of the SDNS Security Protocol at Layer 4 (SP4). National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4792.
Full textHuitema, C., and D. Kaiser. DNS-Based Service Discovery (DNS-SD) Privacy and Security Requirements. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8882.
Full textJansen, Wayne A. Protocol Implementation Conformance Statement (PICS) proforma for the SDNS Security Protocol at Layer 4 (SP4). National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4934.
Full textGalang, Ivory Myka. Is Food Supply Accessible, Affordable, and Stable? The State of Food Security in the Philippines. Philippine Institute for Development Studies, 2022. https://doi.org/10.62986/dp2022.21.
Full text