Betge Brezetz S, Kamga MD, Guesmi A (2013) End-to-end privacy policy enforcement in cloud infrastructure. In: IEEE conference on cloud networking, CloudNet, San Francisco, USA
Betgé Brezetz S, Kamga GB, Joutei A, Maalmi O (2014) SDN-based trusted path control. In: International conference and workshop on the network of the future (NOF), pp 1–5
Bin Z, Peng Dan BX, Weiming W (2016) Research and implementation of the SDN resources transaction process based on trust mechanism. China Commun 1(13):190–197
Google Scholar
Botelho F, Ramos MV, Bessani A (2013) On the feasibility of a consistent and fault-tolerant data store for sdns. In: European workshop software defined networks (EWSDN), pp 38–43
Desai M, Nandagopal T (2010) Coping with link failures in centralized control, plane architecture. In: IEEE COMSNET, pp 1–10
Fitting M (1994) Kleen’s three valued logics and their children. Fundamenta Informaticae 20:113–131
MathSciNet
Article
Google Scholar
Heller B, McKeown N (2012) The controller placement problem. In: ACM SIGCOMM HotSDN, pp 7–12
Ivanovska M, Josang A (2016) Predictive reasoning in subjective bayesian networks. Norsk Informatikkonferanse, Bergen
Google Scholar
Josang A (2016) Subjective logic: a formalism for reasoning under uncertainty. Springer, Berlin
Book
Google Scholar
Josang A (2019) Belief mosaics of subjective opinions. In: 22th International conference on information fusion (FUSION 2019). Ottawa
Jøsang A, Quattrociocchi W (2009) Advanced features in Bayesian reputation systems. In: Proceedings of the 6th international conference on trust, privacy & security in digital business (TrustBus’09), Linz, Austria
Kamapantula BK, Abdelzaher A, Ghosh P, Mayo M, Perkins EJ, Das SK (2014) Leveraging the robustness of genetic networks: a case study on bio-inspired wireless sensor network topologies. J Ambient Intell Hum Comput 5(3):323–339
Article
Google Scholar
Kreutz F, Ramo S, Uhlig (2015) Software defined networking: a comprehensive survey. IEEE Commun Surv Tutor 103(1):14–76
Google Scholar
Laouid A, Dahmani A, Hassen HR, Bounceur A, Euler R, Lalem F, Tari A (2019) A self-managing volatile key scheme for wireless sensor networks. J Ambient Intell Hum Comput 10(9):3349–3364
Article
Google Scholar
Liyanage M, Ahmed I, Ylianttila M, Santos JL (2015) Security for future software defined mobile networks. In: 9th International conference on next generation mobile applications, services and technologies, Cambridge, pp 256–264
Moorthy V, Venkataraman R (2015) Analysis of data transmission management through software defined POX controller. IEEE Global Wireless Summit, Hyderabad
Google Scholar
Moorthy V, Venkataraman R, Rama Rao T (2020) Security and privacy attacks during data communication in Software Defined Mobile Clouds. Comput Commun 153:515–526
Article
Google Scholar
Muller LF, Oliveira R, Barcellos MP (2014) Survivor: an enhanced controller placement strategy for improving sdn survivability. In: IEEE GLOBECOM, pp 1909–1915
Open Networking Foundation (2015) Principles and practices for securing software defined networks, 2275 E. Bayshore Road, Suite 103, Palo Alto, CA 94303. https://www.opennetworking.org
Peng T, Ramamohanarao K (2003) Protection from distributed denial of service attacks using history-based IP filtering. IEEE Int Conf Commun 1:482–486
Article
Google Scholar
Rao S (2011) Denial of service attacks and mitigation techniques: real time implementation with detailed analysis. SANS Institute Reading Room site
Salvestrini F, Ciulli N (2013) Towards a distributed SDN control: inter platform signalling among flow processing platforms. In: IEEE SDN conference on future networks and services, SDN4FNS
Schuba KL, Zamboni D (1997) Analysis of denial of service attack on TCP. In: IEEE symposium in security and privacy, pp 208–223
Yan Q, Richard Y, Li J (2016) Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun Surv Tutor 18:602–622
Article
Google Scholar