Academic literature on the topic 'SDN Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SDN Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SDN Security"

1

Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.

Full text
Abstract:
Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing securit
APA, Harvard, Vancouver, ISO, and other styles
2

Eom, Taehoon, Jin B. Hong, SeongMo An, Jong Sou Park, and Dong Seong Kim. "A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models." Security and Communication Networks 2020 (February 18, 2020): 1–15. http://dx.doi.org/10.1155/2020/7235043.

Full text
Abstract:
Software defined networking (SDN) has been adopted in many application domains as it provides functionalities to dynamically control the network flow more robust and more economical compared to the traditional networks. In order to strengthen the security of the SDN against cyber attacks, many security solutions have been proposed. However, those solutions need to be compared in order to optimize the security of the SDN. To assess and evaluate the security of the SDN systematically, one can use graphical security models (e.g., attack graphs and attack trees). However, it is difficult to provid
APA, Harvard, Vancouver, ISO, and other styles
3

Das, Souvik, and Kamil Sarac. "Practical Labs for Teaching SDN Security." Journal of The Colloquium for Information Systems Security Education 10, no. 1 (2023): 7. http://dx.doi.org/10.53735/cisse.v10i1.166.

Full text
Abstract:
The rapid adoption of Software Defined Networking (SDN) in the industry has exposed certain security risks today some of which are unique to its paradigm. Security issues around the use-cases that expose these risks are fundamentally aligned with the networking and cybersecurity concepts that are taught at the graduate level in academia. In this paper, we present a number of lab activities on SDN security that are inspired from practical use-cases in SDN deployments. The goal of this effort is to help students give a shape to their thought process about the practical security implications of S
APA, Harvard, Vancouver, ISO, and other styles
4

Lam, JunHuy, Sang-Gon Lee, Hoon-Jae Lee, and Yustus Eko Oktian. "Securing SDN Southbound and Data Plane Communication with IBC." Mobile Information Systems 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/1708970.

Full text
Abstract:
In software-defined network (SDN), the southbound protocol defines the communication between the control plane and the data plane. The agreed protocol, OpenFlow, suggests securing the southbound communication with Transport Layer Security (TLS). However, most current SDN projects do not implement the security segment, with only a few exceptions such as OpenDayLight, HP VAN SDN, and ONOS implementing TLS in the southbound communication. From the telecommunication providers’ perspective, one of the major SDN consumers besides data centers, the data plane becomes much more complicated with the ad
APA, Harvard, Vancouver, ISO, and other styles
5

Jo, Hyeonseong, Jaehyun Nam, and Seungwon Shin. "NOSArmor: Building a Secure Network Operating System." Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/9178425.

Full text
Abstract:
Software-Defined Networking (SDN), controlling underlying network devices (i.e., data plane) in a logically centralized manner, is now actively adopted in many real world networking environments. It is clear that a network administrator can easily understand and manage his networking environments with the help of SDN. In SDN, a network operating system (NOS), also known as an SDN controller, is the most critical component because it should be involved in all transactions for controlling network devices, and thus the security of NOS cannot be highly exaggerated. However, in spite of its importa
APA, Harvard, Vancouver, ISO, and other styles
6

Yu, Yang, Yu Nan Wang, and Wei Yang. "Security Framework Based on SDN." Advanced Materials Research 989-994 (July 2014): 4690–93. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4690.

Full text
Abstract:
With the growing demand for information, it has a strategic importance for the future of sustainable development how to create a safe and robust network system to ensure the security of important information. Intrusion detection technology can proactively react against intrusion behavior and adjust its strategies in time. So it provides an effective means for network security to minimize or avoid loss when network system is attacked. It is an important part of network security system. This article first explains the current framework and the working principle of SDN. Then it explains the exist
APA, Harvard, Vancouver, ISO, and other styles
7

Jose, Teenu, and Jincy Kurian. "Survey on SDN Security Mechanisms." International Journal of Computer Applications 132, no. 14 (2015): 32–35. http://dx.doi.org/10.5120/ijca2015907602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fu, Wenwen, Tao Li, and Zhigang Sun. "FAS: Using FPGA to Accelerate and Secure SDN Software Switches." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/5650205.

Full text
Abstract:
Software-Defined Networking (SDN) promises the vision of more flexible and manageable networks but requires certain level of programmability in the data plane to accommodate different forwarding abstractions. SDN software switches running on commodity multicore platforms are programmable and are with low deployment cost. However, the performance of SDN software switches is not satisfactory due to the complex forwarding operations on packets. Moreover, this may hinder the performance of real-time security on software switch. In this paper, we analyze the forwarding procedure and identify the pe
APA, Harvard, Vancouver, ISO, and other styles
9

Savytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev, and Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK." Information technology and computer engineering 58, no. 3 (2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.

Full text
Abstract:
The work is dedicated to the analysis and improvement of methods and tools for building the architecture of software-defined networks (SDNs). A crucial aspect involves comparing the differences between network management using traditional methods and utilizing an SDN controller. Primary attention is given to the development of security models based on software-defined networks.The research is grounded in the analysis of specific cases involving the use of such networks, including gathering opinions and expert assessments from professionals in the field. It leverages publicly available informat
APA, Harvard, Vancouver, ISO, and other styles
10

Tapiero, Robin. "Security in SDN networks and their applications." Ingeniería Solidaria 17, no. 2 (2021): 1–25. http://dx.doi.org/10.16925/2357-6014.2021.02.09.

Full text
Abstract:
Introduction: The review article is the product of the research on Security in SDN networks and their applications, developed at the District University in 2020, presenting the latest advances, that have been made in security.
 Problem: The security weaknesses that SDN networks have had, due to being a new architecture. This has not allowed traditional networks to be replaced.
 
 Objective: To carry out a review of the state of the art of SDN networks, focusing research on the security of the control layer and its advances.
 Methodology: The descriptive method is implemente
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "SDN Security"

1

Abou, El Houda Zakaria. "Security Enforcement through Software Defined Networks (SDN)." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0023.

Full text
Abstract:
La conception originale d'Internet n'a pas pris en compte les aspects de sécurité du réseau, l’objectif prioritaire était de faciliter le processus de communication. Par conséquent, de nombreux protocoles de l'infrastructure Internet exposent un ensemble de vulnérabilités. Ces dernières peuvent être exploitées par les attaquants afin de mener un ensemble d’attaques. Les attaques par déni de service distribué (DDoS) représentent une grande menace; DDoS est l'une des attaques les plus dévastatrices causant des dommages collatéraux aux opérateurs de réseau ainsi qu'aux fournisseurs de services In
APA, Harvard, Vancouver, ISO, and other styles
2

Rivera, Polanco Sergio A. "AUTOMATED NETWORK SECURITY WITH EXCEPTIONS USING SDN." UKnowledge, 2019. https://uknowledge.uky.edu/cs_etds/87.

Full text
Abstract:
Campus networks have recently experienced a proliferation of devices ranging from personal use devices (e.g. smartphones, laptops, tablets), to special-purpose network equipment (e.g. firewalls, network address translation boxes, network caches, load balancers, virtual private network servers, and authentication servers), as well as special-purpose systems (badge readers, IP phones, cameras, location trackers, etc.). To establish directives and regulations regarding the ways in which these heterogeneous systems are allowed to interact with each other and the network infrastructure, organizatio
APA, Harvard, Vancouver, ISO, and other styles
3

Lejaha, Retselisitsoe. "SDN based security solutions for multi-tenancy NFV." Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/24474.

Full text
Abstract:
The Internet continues to expand drastically as a result of explosion of mobile devices, content, server virtualization, and advancement of cloud services. This increase has significantly changed traffic patterns within the enterprise data centres. Therefore, advanced technologies are needed to improve traditional network deployments to enable them to handle the changing network patterns. Software defined networks (SDN) and network function virtualisation (NFV) are innovative technologies that enable network flexibility, increase network and service agility, and support service-driven virtual
APA, Harvard, Vancouver, ISO, and other styles
4

Faizan, Shah Ali. "SDN based security using cognitive algorithm against DDOS." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29880.

Full text
Abstract:
The internet and communication industry continue to develop new technologies rapidly, which has caused a boom in smart and networking device manufacturing. With new trends, operators are constantly battling towards deploying multiple systems to cater for the need of all users. The higher bandwidth utilization and flexibility demanded new networking solutions which paved way for Software Defined Network (SDN). SDN is centralized platform which works with other technologies such as Network Function Virtualization (NFV) to offer reliable, flexible and centrally controllable network solutions. It
APA, Harvard, Vancouver, ISO, and other styles
5

Kodzai, Carlton. "Impact of network security on SDN controller performance." Master's thesis, University of Cape Town, 2020. http://hdl.handle.net/11427/32514.

Full text
Abstract:
Internet Protocol network architectures are gradually evolving from legacy flat networks to new modern software defined networking approaches. This evolution is crucial as it provides the ideal supporting network structure, architecture and framework that supports the technologies that are also evolving in software-based systems like Network Functions Virtualization (NFV). The connectivity requirements resulting from this paradigm shift in technology is being driven by new bandwidth requirements emanating from the huge number of new use cases from 5G networks and Internet of things (IoT) futur
APA, Harvard, Vancouver, ISO, and other styles
6

Stagkopoulou, Alexandra. "Simulative Evaluation of Security Monitoring Systems based on SDN." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193710.

Full text
Abstract:
Software Defined Networks (SDN) constitute the new communication paradigm ofprogrammable computer networks. By decoupling the control and date plane the networkmanagement is easier and more flexible. However, the new architecture is vulnerable to anumber of security threats, which are able to harm the network. Network monitoringsystems are pivotal in order to protect the network. To this end, the evaluation of a networkmonitoring system is crucial before the deployment of it in the real environment. Networksimulators are the complementary part of the process as they are necessary during theeva
APA, Harvard, Vancouver, ISO, and other styles
7

BOERO, LUCA. "Advanced SDN-Based QoS and Security Solutions for Heterogeneous Networks." Doctoral thesis, Università degli studi di Genova, 2019. http://hdl.handle.net/11567/940881.

Full text
Abstract:
This thesis tries to study how SDN can be employed in order to support Quality of Service and how the support of this functionality is fundamental for today networks. Considering, not only the present networks, but also the next generation ones, the importance of the SDN paradigm become manifest as the use of satellite networks, which can be useful considering their broadcasting capabilities. For these reasons, this research focuses its attention on satellite - terrestrial networks and in particular on the use of SDN inside this environment. An important fact to be taken into account is that t
APA, Harvard, Vancouver, ISO, and other styles
8

YUSUPOV, JALOLLIDDIN. "Formal assurance of security policies in automated network orchestration (SDN/NFV)." Doctoral thesis, Politecnico di Torino, 2020. http://hdl.handle.net/11583/2850616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rossi, Mattia. "Software Defined Security: il futuro della sicurezza in rete." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.

Find full text
Abstract:
La tesi in oggetto tratta di come la virtualizzazione, tecnica ormai adottata in molteplici campi dell’informatica, possa essere il futuro delle reti di telecomunicazione. Infatti, NFV (Network Function Virtualization) è un tassello fondamentale per la realizzazione delle cosiddette reti “softwarizzate”, comunemente chiamate SDN (Software-Defined Networking). Queste ultime basano la grande maggioranza delle proprie funzionalità su software installati nel livello applicativo e demandano la gestione del flusso dei dati ad uno o più controller, il quale orchestra l’hardware al livello sottostante
APA, Harvard, Vancouver, ISO, and other styles
10

Pattaranantakul, Montida. "Moving towards software-defined security in the era of NFV and SDN." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL009/document.

Full text
Abstract:
Ce travail de thèse, vise à explorer les problèmes de sécurité et les solutions, dans les environnements réseaux logiciels et virtualisés, avec les deux hypothèses suivantes:(1) Les changements de paradigmes introduits par les réseaux SDN et NFV permettent de développer de nouvelles approches en matière de gestion de la sécurité; (2) L’ensemble des menaces et vulnérabilités dans les environnements NFV/SDN doivent être intégralement pris en compte. Donc, dans une première partie, nous proposons une étude détaillée et complète, du point de vue de la sécurité, des architectures et protocoles SDN/
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "SDN Security"

1

Khondoker, Rahamatullah, ed. SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhu, Shao Ying, Sandra Scott-Hayward, Ludovic Jacquin, and Richard Hill, eds. Guide to Security in SDN and NFV. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64653-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Amanowicz, Marek, Sebastian Szwaczyk, and Konrad Wrona. Data-Centric Security in Software Defined Networks (SDN). Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-55517-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

M, Rajcsanyi Peter, and Bilandžić Vladimir 1946-, eds. SDI and European security. Institute for East-West Security Studies, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rowny, Edward L. SDI, enhancing security and stability. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rowny, Edward L. SDI, enhancing security and stability. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rowny, Edward L. SDI, enhancing security and stability. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Atlantic Institute for International Affairs., ed. The SDI and European security interests. Croom Helm for the Atlantic Institute for International Affairs, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Surikov, B. T. SDI: Key to security or disaster? Progress Publishers, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Services, American Bar Association Committee on Commercial Financial. Committee on Commercial Financial Services, October 24, 2001, San Francisco Marriott, San Francisco, CA. American Bar Association, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "SDN Security"

1

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "SDN and NFV Security." In Software-Defined Networking and Security. CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Attili, Venkata Ramana, Sreenivasa Rao Annaluri, and V. S. Podili Srinivas. "Security Issues in SDN." In Software-Defined Networking for Future Internet Technology. Apple Academic Press, 2021. http://dx.doi.org/10.1201/9781003145721-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

de Freitas, Miguel Borges, Luis Rosa, Tiago Cruz, and Paulo Simões. "SDN-Enabled Virtual Data Diode." In Computer Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "SDN and NFV." In Software-Defined Networking and Security. CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sagare, Anagha Anilkumar, and Rahamatullah Khondoker. "Security Analysis of SDN Routing Applications." In SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chikhale, Ankush, and Rahamatullah Khondoker. "Security Analysis of SDN Cloud Applications." In SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ahmad, Parvez, Sven Jacob, and Rahamatullah Khondoker. "Security Analysis of SDN Applications for Big Data." In SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Artmann, David, and Rahamatullah Khondoker. "Security Analysis of SDN WiFi Applications." In SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lippert, Timm, and Rahamatullah Khondoker. "Security Analysis for the Middleware Assurance Substrate." In SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ilyas, Qamar, and Rahamatullah Khondoker. "Security Analysis of FloodLight, ZeroSDN, Beacon and POX SDN Controllers." In SDN and NFV Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71761-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SDN Security"

1

Latah, Majd, and Kubra Kalkan. "SDN-API-Sec: A Conflict-Free BC-Based Authorization for Cross-Domain SDNs." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yalda, Khirota Gorgees, Diyar Jamal Hamad, Nicolae Tapus, and Ibrahim Taner Okumus. "Security Issues in Software-Defined Networking (SDN) Environments." In 2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2024. http://dx.doi.org/10.1109/roedunet64292.2024.10722112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zerifi, Manare, Abdellatif Ezzouhairi, and Abdelhak Boulaalam. "SDN and NFV security approaches for IoT environments." In 2024 3rd International Conference on Embedded Systems and Artificial Intelligence (ESAI). IEEE, 2024. https://doi.org/10.1109/esai62891.2024.10913860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

K, Shyampradeep, Amith R. Telgar, and K. Saraswathi. "Enhancement of SDN Packet Security Using Quantum Keys." In 2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT). IEEE, 2025. https://doi.org/10.1109/idciot64235.2025.10915048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Scott-Hayward, Sandra, Gemma O'Callaghan, and Sakir Sezer. "Sdn Security: A Survey." In 2013 IEEE SDN for Future Networks and Services (SDN4FNS). IEEE, 2013. http://dx.doi.org/10.1109/sdn4fns.2013.6702553.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smeliansky, R. L. "SDN for network security." In 2014 International Science and Technology Conference (Modern Networking Technologies) (MoNeTeC). IEEE, 2014. http://dx.doi.org/10.1109/monetec.2014.6995602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aneci, Mihai-Nicolae, Laura Gheorghe, Mihai Carabas, Stefan Soriga, and Raluca-Andreea Somesan. "SDN-based security mechanism." In 2015 14th RoEduNet International Conference - Networking in Education and Research (RoEduNet NER). IEEE, 2015. http://dx.doi.org/10.1109/roedunet.2015.7311820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ageyev, Dmytro, Oleg Bondarenko, Walla Alfroukh, and Tamara Radivilova. "Provision security in SDN/NFV." In 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET). IEEE, 2018. http://dx.doi.org/10.1109/tcset.2018.8336252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baidya, Sonali Sen, and Rattikorn Hewett. "SDN-based edge computing security." In SEC '19: The Fourth ACM/IEEE Symposium on Edge Computing. ACM, 2019. http://dx.doi.org/10.1145/3318216.3363374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cox, Jacob H., Russell J. Clark, and Henry L. Owen. "Leveraging SDN for ARP security." In SoutheastCon 2016. IEEE, 2016. http://dx.doi.org/10.1109/secon.2016.7506644.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SDN Security"

1

Yu, Dongting, Andrew W. Moore, Chris Hall, and Ross Anderson. Security: a Killer App for SDN? Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada613601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rowny, Edward L. SDI: Enhancing Security and Stability. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada351518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Andreasen, F., M. Baugher, and D. Wing. Session Description Protocol (SDP) Security Descriptions for Media Streams. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Andreasen, F., and D. Wing. Security Preconditions for Session Description Protocol (SDP) Media Streams. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc5027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Holmberg, C., and R. Shpount. Session Description Protocol (SDP) Offer/Answer Considerations for Datagram Transport Layer Security (DTLS) and Transport Layer Security (TLS). RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dinkel, Charles. Secure data network system (SDNS) network, transport, and message security protocols. National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.90-4250.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jansen, Wayne A. A formal description of the SDNS Security Protocol at Layer 4 (SP4). National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Huitema, C., and D. Kaiser. DNS-Based Service Discovery (DNS-SD) Privacy and Security Requirements. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jansen, Wayne A. Protocol Implementation Conformance Statement (PICS) proforma for the SDNS Security Protocol at Layer 4 (SP4). National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Galang, Ivory Myka. Is Food Supply Accessible, Affordable, and Stable? The State of Food Security in the Philippines. Philippine Institute for Development Studies, 2022. https://doi.org/10.62986/dp2022.21.

Full text
Abstract:
Based on The Economist’s 2021 Global Food Security Index (GFSI), the Philippines ranked 64th out of 113 countries in terms of its four dimensions of food security. After the World War II ended, the world still had to contend with population explosion, hunger, and poverty. The Philippines, just like other countries in the world, was actively searching for solutions through the conduct of research and the implementation of various agricultural programs and nutrition programs aimed at increasing food production and fighting the widespread malnutrition, especially among Filipino children. Since th
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!