Academic literature on the topic 'Software Defined Networking Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software Defined Networking Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Software Defined Networking Security"
Dabbagh, Mehiar, Bechir Hamdaoui, Mohsen Guizani, and Ammar Rayes. "Software-defined networking security: pros and cons." IEEE Communications Magazine 53, no. 6 (June 2015): 73–79. http://dx.doi.org/10.1109/mcom.2015.7120048.
Full textHussein, A., Louma Chadad, Nareg Adalian, Ali Chehab, Imad H. Elhajj, and Ayman Kayssi. "Software-Defined Networking (SDN): the security review." Journal of Cyber Security Technology 4, no. 1 (August 8, 2019): 1–66. http://dx.doi.org/10.1080/23742917.2019.1629529.
Full textNagarjuna Reddy, Tella, and K. Annapurani Panaiyappan. "Intrusion Detection on Software Defined Networking." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 330. http://dx.doi.org/10.14419/ijet.v7i3.12.16052.
Full textMcCoy, James, and Danda B. Rawat. "Software-Defined Networking for Unmanned Aerial Vehicular Networking and Security: A Survey." Electronics 8, no. 12 (December 3, 2019): 1468. http://dx.doi.org/10.3390/electronics8121468.
Full textLara, Adrian, and Byrav Ramamurthy. "OpenSec: Policy-Based Security Using Software-Defined Networking." IEEE Transactions on Network and Service Management 13, no. 1 (March 2016): 30–42. http://dx.doi.org/10.1109/tnsm.2016.2517407.
Full textDacier, Marc C., Hartmut Konig, Radoslaw Cwalinski, Frank Kargl, and Sven Dietrich. "Security Challenges and Opportunities of Software-Defined Networking." IEEE Security & Privacy 15, no. 2 (March 2017): 96–100. http://dx.doi.org/10.1109/msp.2017.46.
Full textLiu, Jiaqiang, Yong Li, Huandong Wang, Depeng Jin, Li Su, Lieguang Zeng, and Thanos Vasilakos. "Leveraging software-defined networking for security policy enforcement." Information Sciences 327 (January 2016): 288–99. http://dx.doi.org/10.1016/j.ins.2015.08.019.
Full textShu, Zhaogang, Jiafu Wan, Di Li, Jiaxiang Lin, Athanasios V. Vasilakos, and Muhammad Imran. "Security in Software-Defined Networking: Threats and Countermeasures." Mobile Networks and Applications 21, no. 5 (January 12, 2016): 764–76. http://dx.doi.org/10.1007/s11036-016-0676-x.
Full textKaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (October 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.
Full textSavaliya, Abhishek, Rutvij H. Jhaveri, Qin Xin, Saad Alqithami, Sagar Ramani, and Tariq Ahamed Ahanger. "Securing industrial communication with software-defined networking." Mathematical Biosciences and Engineering 18, no. 6 (2021): 8298–313. http://dx.doi.org/10.3934/mbe.2021411.
Full textDissertations / Theses on the topic "Software Defined Networking Security"
Taylor, Curtis Robin. "Software-defined Networking: Improving Security for Enterprise and Home Networks." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-dissertations/161.
Full textLi, Xin. "Enhancing network robustness using software-defined networking." Diss., Kansas State University, 2017. http://hdl.handle.net/2097/38236.
Full textDepartment of Electrical and Computer Engineering
Don M. Gruenbacher
Caterina M. Scoglio
As today's networks are no longer individual networks, networks are less robust towards failures and attacks. For example, computer networks and power networks are interdependent. Computer networks provide smart control for power networks, while power networks provide power supply. Localized network failures and attacks are amplified and exacerbated back and forth between two networks due to their interdependencies. This dissertation focuses on finding solutions to enhance network robustness. Software-defined networking provides a programmable architecture, which can dynamically adapt to any changes and can reduce the complexities of network traffic management. This architecture brings opportunities to enhance network robustness, for example, adapting to network changes, routing traffic bypassing malfunction devices, dropping malicious flows, etc. However, as SDN is rapidly proceeding from vision to reality, the SDN architecture itself might be exposed to some robustness threats. Especially, the SDN control plane is tremendously attractive to attackers, since it is the "brain" of entire networks. Thus, researching on network robustness helps protect network from a destructive disaster. In this dissertation, we first build a novel, realistic interdependent network framework to model cyber-physical networks. We allocate dependency links under a limited budget and evaluate network robustness. We further revise a network flow algorithm and find solutions to obtain a basic robust network structure. Extensive simulations on random networks and real networks show that our deployment method produces topologies that are more robust than the ones obtained by other deployment techniques. Second, we tackle middlebox chain problems using SDN. In computer networks, applications require traffic to sequence through multiple types of middleboxes to accomplish network functionality. Middlebox policies, numerous applications' requirements, and resource allocations complicate network management. Furthermore, middlebox failures can affect network robustness. We formulate a mixed-integer linear programming problem to achieve a network load-balancing objective in the context of middlebox policy chain routing. Our global routing approach manages network resources efficiently by simplifying candidate-path selections, balancing the entire network and using the simulated annealing algorithm. Moreover, in case of middlebox failures, we design a fast rerouting mechanism by exploiting the remaining link and middlebox resources locally. We implement proposed routing approaches on a Mininet testbed and evaluate experiments' scalability, assessing the effectiveness of the approaches. Third, we build an adversary model to describe in detail how to launch distributed denial of service (DDoS) attacks to overwhelm the SDN controller. Then we discuss possible defense mechanisms to protect the controller from DDoS attacks. We implement a successful DDoS attack and our defense mechanism on the Mininet testbed to demonstrate its feasibility in the real world. In summary, we vertically dive into enhancing network robustness by constructing a topological framework, making routing decisions, and protecting the SDN controller.
Tseng, Yuchia. "Securing network applications in software defined networking." Electronic Thesis or Diss., Sorbonne Paris Cité, 2018. http://www.theses.fr/2018USPCB036.
Full textThe rapid development and convergence of computing technologies and communications create the need to connect diverse devices with different operating systems and protocols. This resulted in numerous challenges to provide seamless integration of a large amount of heterogeneous physical devices or entities. Hence, Software-defined Networks (SDN), as an emerging paradigm, has the potential to revolutionize the legacy network management and accelerate the network innovation by centralizing the control and visibility over the network. However, security issues remain a significant concern and impede SDN from being widely adopted.To identity the threats that inherent to SDN, we conducted a deep analysis in 3 dimensions to evaluate the security of the proposed architecture. In this analysis, we summarized 9security principles for the SDN controller and checked the security of the current well-known SDN controllers with those principles. We found that the SDN controllers, namely ONOS and OpenContrail, are relatively two more secure controllers according to our conducted methodology. We also found the urgent need to integrate the mechanisms such as connection verification, application-based access control, and data-to-control traffic control for securely implementing a SDN controller. In this thesis, we focus on the app-to-control threats, which could be partially mitigated by the application-based access control. As the malicious network application can be injected to the SDN controller through external APIs, i.e., RESTful APIs, or internal APIs, including OSGi bundles, Java APIs, Python APIs etc. In this thesis, we discuss how to protect the SDN controller against the malicious operations caused by the network application injection both through the external APIs and the internal APIs. We proposed a security-enhancing layer (SE-layer) to protect the interaction between the control plane and the application plane in an efficient way with the fine-grained access control, especially hardening the SDN controller against the attacks from the external APIs. This SE-layer is implemented in the RESTful-based northbound interfaces in the SDN controller and hence it is controller-independent for working with most popular controllers, such as OpenDaylight, ONOS, Floodlight, Ryu and POX, with low deployment complexity. No modifications of the source codes are required in their implementations while the overall security of the SDN controller is enhanced. Our developed prototype I, Controller SEPA, protects well the SDN controller with network application authentication, authorization, application isolation, and information shielding with negligible latency from less than 0.1% to 0.3% for protecting SDN controller against the attacks via external APIs, i.e, RESTful APIs. We developed also the SE-layer prototype II, called Controller DAC, which makes dynamic the access control. Controller DAC can detect the API abuse from the external APIs by accounting the network application operation with latency less than 0.5%. Thanks to this SE-layer, the overall security of the SDN controller is improved but with a latency of less than 0.5%. However, the SE-layer can isolate the network application to communicate the controller only through the RESTful APIs. However, the RESTful APIs is insufficient in the use cases which needs the real-time service to deliver the OpenFlow messages. Therefore, we proposed a security-enhancing architecture for securing the network application deployment through the internal APIs in SDN, with a new SDN architecture dubbed SENAD. In SENAD, we split the SDN controller in: (1) a data plane controller (DPC), and (2) an application plane controller (APC) and adopt the message bus system as the northbound interface instead of the RESTful APIs for providing the service to deliver the OpenFlow messages in real-time. (...)
Aydeger, Abdullah. "Software Defined Networking for Smart Grid Communications." FIU Digital Commons, 2016. http://digitalcommons.fiu.edu/etd/2580.
Full textAhmad, I. (Ijaz). "Improving software defined cognitive and secure networking." Doctoral thesis, Oulun yliopisto, 2018. http://urn.fi/urn:isbn:9789526219516.
Full textTiivistelmä Perinteiset tietoliikenneverkot pohjautuvat usein laajoille manuaalisesti konfiguroitaville valmistajakohtaisille ratkaisuille. Niissä käytetään laitekohtaista kontrollilogiikkaa tai verkon eri toiminnallisuuksien algoritmeja. Tämän johdosta verkon hajautettu kontrollitaso muodostuu monimutkaiseksi, jota on vaikea integroida ja operoida, eikä se ole kovin joustava resurssien käytön suhteen. Tietoliikenteen määrän kasvaessa tulee entistä tärkeämmäksi integroida useita verkkoteknologioita ja autonomisia verkon toiminnallisuuksia tehokkaan resurssinhallinnan saavuttamiseksi. Ohjelmisto-ohjatut verkkoratkaisut (SDN, Software Defined Networking) tarjoavat keinon hallita erikseen verkon kontrolliliikennettä eroteltuna dataliikenteestä keskitetysti. Tämä kontrollitaso voi integroida erilaisia verkkolaitteita ja ohjata niitä ajonaikaisesti valmistajariippumattoman sovellusohjelmointirajapinnan kautta. Tässä työssä on tutkittu älykästä ohjelmisto-ohjattavaa verkkoratkaisua, jonka avulla eri radioverkkoteknologiat (mukaan lukien konginitiiviradio) voidaan integroida yhteisen kontrollialustan kautta lisäämään verkon kokonaissuorituskykyä. Työssä esitetään kognitiivinen ohjelmisto-ohjattu verkon arkkitehtuuriratkaisu sekä sen suorituskyvyn arviointi mittauksiin pohjautuen. Koska ohjelmisto-ohjattu verkko pohjautuu koko verkon keskitettyyn kontrollilogiikkaan, on tietoturvan merkitys korostunut entisestään. Tässä työssä on sen vuoksi tutkittu juuri tällaisen verkkoratkaisun mahdollisia tietoturvauhkia sekä niiden torjumiseen soveltuvia ratkaisuvaihtoehtoja sekä esitetään tulevaisuuden kehityssuuntia vielä ratkaisemattomille uhkille. Lisäksi työssä on tutkittu laajemmin tulevien 5G verkkojen tietoturvauhkia ja niiden ratkaisuja, liittyen ohjelmisto-ohjattuihin verkkoratkaisuin, pilviteknologioihin ja virtualisoiduille verkkotoiminnallisuuksille. Työ tarjoaa myös näkemyksen siitä, miten verkon tietoturvaa voidaan kokonaisuudessaan lisätä 5G verkoissa
Lei, Yunsen. "Towards Better Kernel and Network Monitoring of Software Actions." Digital WPI, 2020. https://digitalcommons.wpi.edu/etd-theses/1367.
Full textSriskandarajah, Shriparen. "Detection and mitigation of denial-of-service attacks against software-defined networking." Thesis, Queensland University of Technology, 2021. https://eprints.qut.edu.au/226951/1/Shriparen_Sriskandarajah_Thesis.pdf.
Full textAbou, El Houda Zakaria. "Security Enforcement through Software Defined Networks (SDN)." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0023.
Full textThe original design of Internet did not take into consideration security aspects of the network; the priority was to facilitate the process of communication. Therefore, many of the protocols that are part of the Internet infrastructure expose a set of vulnerabilities that can be exploited by attackers to carry out a set of attacks. Distributed Denial-of-Service (DDoS) represents a big threat and one of the most devastating and destructive attacks plaguing network operators and Internet service providers (ISPs) in stealthy way. Software defined networks (SDN) is an emerging technology that promises to solve the limitations of the conventional network architecture by decoupling the control plane from the data plane. On one hand, the separation of the control plane from the data plane allows for more control over the network and brings new capabilities to deal with DDoS attacks. On the other hand, this separation introduces new challenges regarding the security of the control plane. This thesis aims to deal with DDoS attacks while protecting the resources of the control plane. In this thesis, we contribute to the mitigation of both intra-domain and inter-domain DDoS attacks, and we contribute to the reinforcement of security aspects in SDN
Taylor, Curtis R. "Leveraging Software-Defined Networking and Virtualization for a One-to-One Client-Server Model." Digital WPI, 2014. https://digitalcommons.wpi.edu/etd-theses/577.
Full textRivera, Polanco Sergio A. "AUTOMATED NETWORK SECURITY WITH EXCEPTIONS USING SDN." UKnowledge, 2019. https://uknowledge.uky.edu/cs_etds/87.
Full textBooks on the topic "Software Defined Networking Security"
Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. Software-Defined Networking and Security. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768.
Full textSahoo, Kshira Sagar, Bibhudatta Sahoo, and Brojo Kishore Mishra. Software-Defined Networking for Future Internet Technology. New York: Apple Academic Press, 2021. http://dx.doi.org/10.1201/9781003145721.
Full textGhonge, Mangesh M., Sabyasachi Pramanik, and Amol D. Potgantwar, eds. Software Defined Networking for Ad Hoc Networks. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91149-2.
Full textQi, Heng, and Keqiu Li. Software Defined Networking Applications in Distributed Datacenters. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33135-5.
Full textItaly) IEEE SDN for Future Networks and Services (2013 Trento. 2013 IEEE SDN for Future Networks and Services (SDN4FNS 2013): Trento, Italy, 11-13 November 2013. Piscataway, NJ: IEEE, 2013.
Find full textL, Antonakos James, ed. Computer networking from LANs to WANs: Hardware, software and security. Boston, MA: Course Technology, Cengage Learning, 2010.
Find full textInc, Cisco Systems, and Cisco Networking Academy Program, eds. Cisco Networking Academy Program: Fundamentals of network security companion guide / Cisco Systems, Inc., Cisco Networking Academy Program. Indianapolis, Ind: Cisco Press, 2004.
Find full textParker, Philip M. Information technology (IT) security software in Hong Kong: A strategic reference, 2006. [San Diego, Calif]: Icon Group International, 2007.
Find full textSeagren, Eric. Secure your network for free: Using Nmap, Wireshark, Snort, Nessus, and MRTG. Edited by Noonan Wesley J. Rockland, Mass: Syngress, 2006.
Find full textBrian, Baskin, and Piltzecker Tony 1975-, eds. Combating spyware in the enterprise. Rockland, MA: Syngress, 2006.
Find full textBook chapters on the topic "Software Defined Networking Security"
Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Virtual Networking." In Software-Defined Networking and Security, 39–79. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-3.
Full textHuang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Intelligent Software-Defined Security." In Software-Defined Networking and Security, 281–301. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-13.
Full textHuang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Network Security Preliminaries." In Software-Defined Networking and Security, 109–26. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-5.
Full textHuang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "SDN and NFV Security." In Software-Defined Networking and Security, 127–49. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-6.
Full textNazar, Muhammad Junaid, Saleem Iqbal, Saud Altaf, Kashif Naseer Qureshi, Khalid Hussain Usmani, and Sobia Wassan. "Software-Defined Networking (SDN) Security Concerns." In Information Security Handbook, 19–38. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9780367808228-2.
Full textHuang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Security Policy Management in Distributed SDN Environments." In Software-Defined Networking and Security, 247–80. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-12.
Full textHuang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Attack Representation." In Software-Defined Networking and Security, 205–24. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-10.
Full textHuang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Service Function Chaining." In Software-Defined Networking and Security, 225–46. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-11.
Full textHuang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Introduction of Computer Networks." In Software-Defined Networking and Security, 7–38. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-2.
Full textHuang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "SDN and NFV." In Software-Defined Networking and Security, 81–108. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-4.
Full textConference papers on the topic "Software Defined Networking Security"
François, Jérôme, Lautaro Dolberg, Olivier Festor, and Thomas Engel. "Network security through software defined networking." In the Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2670386.2670390.
Full textAhmad, Ijaz, Suneth Namal, Mika Ylianttila, and Andrei Gurtov. "Towards software defined cognitive networking." In 2015 7th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2015. http://dx.doi.org/10.1109/ntms.2015.7266528.
Full textKlingel, David, Rahamatullah Khondoker, Ronald Marx, and Kpatcha Bayarou. "Security Analysis of Software Defined Networking Architectures." In the AINTEC 2014. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2684793.2684796.
Full textShang, Fengjun, and Qiang Fu. "A Software-Defined Networking Security Controller Architecture." In 2016 4th International Conference on Machinery, Materials and Computing Technology. Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/icmmct-16.2016.43.
Full textBian, Shanshan, Peng Zhang, and Zheng Yan. "A Survey on Software-Defined Networking Security." In 9th EAI International Conference on Mobile Multimedia Communications. ACM, 2016. http://dx.doi.org/10.4108/eai.18-6-2016.2264176.
Full textSmyth, Dylan, Victor Cionca, Sean McSweeney, and Donna O'Shea. "Exploiting pitfalls in software-defined networking implementation." In 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, 2016. http://dx.doi.org/10.1109/cybersecpods.2016.7502354.
Full textMelki, Reem, Ali Hussein, and Ali Chehab. "Enhancing Multipath TCP Security Through Software Defined Networking." In 2019 Sixth International Conference on Software Defined Systems (SDS). IEEE, 2019. http://dx.doi.org/10.1109/sds.2019.8768608.
Full textFrancois, Jerome, and Olivier Festor. "Anomaly traceback using software defined networking." In 2014 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2014. http://dx.doi.org/10.1109/wifs.2014.7084328.
Full textAziz, Normaziah A., Teddy Mantoro, M. Aiman Khairudin, and A. Faiz b. A. Murshid. "Software Defined Networking (SDN) and its Security Issues." In 2018 International Conference on Computing, Engineering, and Design (ICCED). IEEE, 2018. http://dx.doi.org/10.1109/icced.2018.00018.
Full textMelkov, Dmitrij, and Sarunas Paulikas. "Security Benefits and Drawbacks of Software-Defined Networking." In 2021 IEEE Open Conference of Electrical, Electronic and Information Sciences (eStream). IEEE, 2021. http://dx.doi.org/10.1109/estream53087.2021.9431466.
Full textReports on the topic "Software Defined Networking Security"
Torres, Dustin, Jonathan Friedman, Thomas Schmid, and Mani B. Srivastave. Software-Defined Underwater Acoustic Networking Platform. Fort Belvoir, VA: Defense Technical Information Center, November 2009. http://dx.doi.org/10.21236/ada510286.
Full textDenazis, S., J. Hadi Salim, D. Meyer, and O. Koufopavlou. Software-Defined Networking (SDN): Layers and Architecture Terminology. Edited by E. Haleplidis and K. Pentikousis. RFC Editor, January 2015. http://dx.doi.org/10.17487/rfc7426.
Full textLopez, D., M. Boucadair, and P. Iovanna. Cooperating Layered Architecture for Software-Defined Networking (CLAS). RFC Editor, May 2019. http://dx.doi.org/10.17487/rfc8597.
Full textBhuvaneswaran, V., A. Basil, M. Tassinari, V. Manral, and S. Banks. Terminology for Benchmarking Software-Defined Networking (SDN) Controller Performance. RFC Editor, October 2018. http://dx.doi.org/10.17487/rfc8455.
Full textBhuvaneswaran, V., A. Basil, M. Tassinari, V. Manral, and S. Banks. Benchmarking Methodology for Software-Defined Networking (SDN) Controller Performance. RFC Editor, October 2018. http://dx.doi.org/10.17487/rfc8456.
Full textBoucadair, M., and C. Jacquenet. Software-Defined Networking: A Perspective from within a Service Provider Environment. RFC Editor, March 2014. http://dx.doi.org/10.17487/rfc7149.
Full textMix, Scott, Mark Hadley, Surya Singh, Clifton Eyre, Laurence Chang, S. Cullen Tollbom, Christopher Bonebrake, et al. Software-defined Networking for Energy Delivery Systems (SDN4EDS): An Architectural Blueprint – Final Report. Office of Scientific and Technical Information (OSTI), December 2021. http://dx.doi.org/10.2172/1840650.
Full textMarin-Lopez, R., G. Lopez-Millan, and F. Pereniguez-Garcia. A YANG Data Model for IPsec Flow Protection Based on Software-Defined Networking (SDN). RFC Editor, July 2021. http://dx.doi.org/10.17487/rfc9061.
Full textMix, Scott, Mark Hadley, Surya Singh, Clifton Eyre, Laurence Chang, S. Cullen Tollbom, Christopher Bonebrake, et al. Software-defined Networking for Energy Delivery Systems (SDN4EDS): An Architectural Blueprint – Final Summary Report. Office of Scientific and Technical Information (OSTI), December 2021. http://dx.doi.org/10.2172/1840651.
Full textYuan, Xin. Software Defined Networking for HPC Interconnects and its Extension across Domains. Final Technical Report for DE-SC0016039. Office of Scientific and Technical Information (OSTI), May 2019. http://dx.doi.org/10.2172/1512493.
Full text