Journal articles on the topic 'SDN Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SDN Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.
Full textEom, Taehoon, Jin B. Hong, SeongMo An, Jong Sou Park, and Dong Seong Kim. "A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models." Security and Communication Networks 2020 (February 18, 2020): 1–15. http://dx.doi.org/10.1155/2020/7235043.
Full textDas, Souvik, and Kamil Sarac. "Practical Labs for Teaching SDN Security." Journal of The Colloquium for Information Systems Security Education 10, no. 1 (2023): 7. http://dx.doi.org/10.53735/cisse.v10i1.166.
Full textLam, JunHuy, Sang-Gon Lee, Hoon-Jae Lee, and Yustus Eko Oktian. "Securing SDN Southbound and Data Plane Communication with IBC." Mobile Information Systems 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/1708970.
Full textYu, Yang, Yu Nan Wang, and Wei Yang. "Security Framework Based on SDN." Advanced Materials Research 989-994 (July 2014): 4690–93. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4690.
Full textJose, Teenu, and Jincy Kurian. "Survey on SDN Security Mechanisms." International Journal of Computer Applications 132, no. 14 (2015): 32–35. http://dx.doi.org/10.5120/ijca2015907602.
Full textJo, Hyeonseong, Jaehyun Nam, and Seungwon Shin. "NOSArmor: Building a Secure Network Operating System." Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/9178425.
Full textSavytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev, and Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK." Information technology and computer engineering 58, no. 3 (2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.
Full textFu, Wenwen, Tao Li, and Zhigang Sun. "FAS: Using FPGA to Accelerate and Secure SDN Software Switches." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/5650205.
Full textTapiero, Robin. "Security in SDN networks and their applications." Ingeniería Solidaria 17, no. 2 (2021): 1–25. http://dx.doi.org/10.16925/2357-6014.2021.02.09.
Full textM., Silambarasan, Michael Vinoline Rinoj B., and Karthik V. "A Novel SDN Architecture for IoT Security." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 48–52. https://doi.org/10.5281/zenodo.3842856.
Full textZhang, Heng, Zhiping Cai, Qiang Liu, Qingjun Xiao, Yangyang Li, and Chak Fone Cheang. "A Survey on Security-Aware Measurement in SDN." Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/2459154.
Full textA Suleman, A. Mustafa, H. U. R. Kayani, M. A. Raza, and A. Saleem. "REVIEW OF SECURITY ATTACKS ON SOFTWARE DEFINED NETWORKING." Pakistan Journal of Scientific Research 3, no. 1 (2023): 60–80. http://dx.doi.org/10.57041/pjosr.v3i1.966.
Full textMa, Yingying, Chaowen Chang, Ping Wu, Jingxu Xiao, and Lu Yuan. "BSSN-SDNs: A Blockchain-Based Security Service Negotiation for the SDN Interdomain." Electronics 13, no. 16 (2024): 3120. http://dx.doi.org/10.3390/electronics13163120.
Full textAl-Shareeda, Mahmood A., Abeer Abdullah Alsadhan, Hamzah H. Qasim, and Selvakumar Manickam. "Software defined networking for internet of things: review, techniques, challenges, and future directions." Bulletin of Electrical Engineering and Informatics 13, no. 1 (2024): 638–47. http://dx.doi.org/10.11591/eei.v13i1.6386.
Full textAlkhamisi, Abrar, Iyad Katib, and Seyed M. Buhari. "Blockchain-Based Control Plane Attack Detection Mechanisms for Multi-Controller Software-Defined Networks." Electronics 13, no. 12 (2024): 2279. http://dx.doi.org/10.3390/electronics13122279.
Full textHande, Yogita, and Akkalashmi Muddana. "A Survey on Intrusion Detection System for Software Defined Networks (SDN)." International Journal of Business Data Communications and Networking 16, no. 1 (2020): 28–47. http://dx.doi.org/10.4018/ijbdcn.2020010103.
Full textSalama, Ramiz, Chadi Altrjman, and Fadi Al-Turjman. "Network Security in Architectures for Software Defined Networking (SDN)." NEU Journal for Artificial Intelligence and Internet of Things 4, no. 1 (2025): 37–44. https://doi.org/10.32955/neuaiit202541960.
Full textSiham, Aouad, El Meghrouni Issam, Sabri Yassine, Hilmani Adil, and Maizate Abderrahim. "Security of software defined networks: evolution and challenges." International Journal of Reconfigurable and Embedded Systems (IJRES) 12, no. 3 (2023): 384–91. https://doi.org/10.11591/ijres.v12.i3pp384-391.
Full textDeepak, Kumar* Manu Sood. "SOFTWARE DEFINED NETWORKS (SDN): APPROACHES NEEDED FOR UP-GRADATION OF SDN'S." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 2 (2017): 521–26. https://doi.org/10.5281/zenodo.322481.
Full textSablok, Aman, and Rohini S. Hallikar. "SDN Integration with Firewalls and Enhancing Security Monitoring on Firewalls." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26202.
Full textAouad, Siham, Issam El Meghrouni, Yassine Sabri, Adil Hilmani, and Abderrahim Maizate. "Security of software defined networks: evolution and challenges." International Journal of Reconfigurable and Embedded Systems (IJRES) 12, no. 3 (2023): 384. http://dx.doi.org/10.11591/ijres.v12.i3.pp384-391.
Full textManikumar S, Lakshmana, and Dr. K. Savitha. "Design and Implementation of Secure Data Transmission Using SDN and Advanced Cryptographic Techniques." International Journal of Advanced Networking and Applications 16, no. 06 (2025): 6670–76. https://doi.org/10.35444/ijana.2025.16607.
Full textKaur, H., N. Singh, and L. Kaur. "SECURITY EVALUATION FOR SDN BASED NETWORKS." Advances in Mathematics: Scientific Journal 9, no. 6 (2020): 4067–75. http://dx.doi.org/10.37418/amsj.9.6.88.
Full textLee, Ye-won, and Chae-woo Lee. "Security System Load Reduction in SDN." Journal of Korean Institute of Communications and Information Sciences 46, no. 12 (2021): 2251–61. http://dx.doi.org/10.7840/kics.2021.46.12.2251.
Full textD, Kumar, and Veni C. "IoE Security Through Multi-Agent SDN." International Journal of Computer Trends and Technology 69, no. 12 (2021): 5–9. http://dx.doi.org/10.14445/22312803/ijctt-v69i12p102.
Full textCai, Zhiping, Chengchen Hu, Kai Zheng, Yang Xu, and Qiang Fu. "Network Security and Management in SDN." Security and Communication Networks 2018 (June 4, 2018): 1–2. http://dx.doi.org/10.1155/2018/7928503.
Full textCorrea Chica, Juan Camilo, Jenny Cuatindioy Imbachi, and Juan Felipe Botero Vega. "Security in SDN: A comprehensive survey." Journal of Network and Computer Applications 159 (June 2020): 102595. http://dx.doi.org/10.1016/j.jnca.2020.102595.
Full textFartitchou, Mohamed, Ismail Lamaakal, Yassine Maleh, et al. "IOTASDN: IOTA 2.0 Smart Contracts for Securing Software-Defined Networking Ecosystem." Sensors 24, no. 17 (2024): 5716. http://dx.doi.org/10.3390/s24175716.
Full textWaseem, Quadri, Sultan S. Alshamrani, Kashif Nisar, Wan Isni Sofiah Wan Din, and Ahmed Saeed Alghamdi. "Future Technology: Software-Defined Network (SDN) Forensic." Symmetry 13, no. 5 (2021): 767. http://dx.doi.org/10.3390/sym13050767.
Full textIslam, MD Samiul, Mohammed Al-Mukhtar, MD Rahat Kader Khan, and Mojammel Hossain. "A Survey on SDN and SDCN Traffic Measurement: Existing Approaches and Research Challenges." Eng 4, no. 2 (2023): 1071–115. http://dx.doi.org/10.3390/eng4020063.
Full textSravani, Mrs P., K. Shiva Kumar, P. Jai Raj Sai, K. Mohan Aditya, and S. S. K. Chaitanya. "Botnet Attacks in Computer Network Security." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1826–34. https://doi.org/10.22214/ijraset.2025.67676.
Full textPliekhova, G. А., S. М. Neronov, М. V. Kostikova, and S. O. Kashkevich. "Improvement of the secure routing model in software-configured networks." Bionics of Intelligence 1, no. 100 (2024): 50–57. http://dx.doi.org/10.30837/bi.2024.1(100).07.
Full textAmeen, Ali. "ASSURING THE SDN SECURITY BY MODELLING AND COMPARING SDN PROPOSED TOPOLOGIES USING PETRI NETS." Journal of Engineering Science XXVIII, no. 4 (2021): 93–105. http://dx.doi.org/10.52326/jes.utm.2021.28(4).08.
Full textSarica, Alper Kaan, and Pelin Angin. "Explainable Security in SDN-Based IoT Networks." Sensors 20, no. 24 (2020): 7326. http://dx.doi.org/10.3390/s20247326.
Full textGaur, Kuntal, Umashankar Rawat, Saket Acharya, Pradeep Kumar, and Anshuman Kalla. "Novel framework for enhancing security of SDN based VPLS architecture." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): 1331–43. http://dx.doi.org/10.47974/jdmsc-1986.
Full textAlgarni, Sultan, Fathy Eassa, Khalid Almarhabi, Abdullah Algarni, and Aiiad Albeshri. "BCNBI: A Blockchain-Based Security Framework for Northbound Interface in Software-Defined Networking." Electronics 11, no. 7 (2022): 996. http://dx.doi.org/10.3390/electronics11070996.
Full textPetukhov, Andrey N., and Paul L. Pilyugin. "”Common Criteria” and Software Defined Network Security." Modeling and Analysis of Information Systems 26, no. 1 (2019): 134–45. http://dx.doi.org/10.18255/1818-1015-2019-1-134-145.
Full textOnyema, Edeh Michael, M. Anand Kumar, Sundaravadivazhagn Balasubaramanian, et al. "A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks." Sustainability 14, no. 19 (2022): 11950. http://dx.doi.org/10.3390/su141911950.
Full textAlrashede, Hamad, Fathy Eassa, Abdullah Marish Ali, Faisal Albalwy, and Hosam Aljihani. "A Blockchain-Based Security Framework for East-West Interface of SDN." Electronics 13, no. 19 (2024): 3799. http://dx.doi.org/10.3390/electronics13193799.
Full textTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Full textAlrashede, Hamad, Fathy Eassa, Abdullah Marish Ali, Hosam Aljihani, and Faisal Albalwy. "Enhancing east-west interface security in heterogeneous SDN via blockchain." PeerJ Computer Science 11 (May 26, 2025): e2914. https://doi.org/10.7717/peerj-cs.2914.
Full textTsehay, Admassu Assegie, and Sekharan Nair Pramod. "A review on software defined network security risks and challenges." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 6 (2019): 3168–74. https://doi.org/10.12928/TELKOMNIKA.v17i6.13119.
Full textCheng, Haosu, Jianwei Liu, Jian Mao, Mengmeng Wang, Jie Chen, and Jingdong Bian. "A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN." Security and Communication Networks 2018 (November 15, 2018): 1–20. http://dx.doi.org/10.1155/2018/8392080.
Full textAly, Wael Hosny Fouad, Hassan Kanj, Nour Mostafa, and Samer Alabed. "Feedback ARMA Models versus Bayesian Models towards Securing OpenFlow Controllers for SDNs." Electronics 11, no. 9 (2022): 1513. http://dx.doi.org/10.3390/electronics11091513.
Full textMishra, Shailendra. "SDN-Based Secure Architecture for IoT." International Journal of Knowledge and Systems Science 11, no. 4 (2020): 1–16. http://dx.doi.org/10.4018/ijkss.2020100101.
Full textSu, Yinghao, Dapeng Xiong, Kechang Qian, and Yu Wang. "A Comprehensive Survey of Distributed Denial of Service Detection and Mitigation Technologies in Software-Defined Network." Electronics 13, no. 4 (2024): 807. http://dx.doi.org/10.3390/electronics13040807.
Full textDe Bruyn, Ben. "The Hot War: Climate, Security, Fiction." Studies in the Novel 50, no. 1 (2018): 43–67. http://dx.doi.org/10.1353/sdn.2018.0003.
Full textLevterov, Andrii, Hanna Pliekhova, Maryna Kostikova, Nataliia Berezhna, and Anton Okun. "ENHANCING SECURITY IN SOFTWARE-DEFINED NETWORKING THROUGH ROUTING TECHNIQUES EXPLORATION." Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, no. 1 (9) (July 15, 2023): 10–18. http://dx.doi.org/10.20998/2079-0023.2023.01.02.
Full textAmeen, Ali. "LEVERAGING BLOCKCHAIN TECHNOLOGY TO ASSURE SECURITY OF SDN." Journal of Engineering Science XXVII (4) (December 15, 2020): 128–39. https://doi.org/10.5281/zenodo.4288305.
Full text