共 14 条
- [1] Hong S., Xu L., Wang H., Et al., Poisoning network visibility in software-defined networks: New attacks and countermeasures, Proc of ISOC NDSS'15, pp. 8-11, (2015)
- [2] Li Q., Zhang X., Zheng Q., Et al., LIVE: Lightweight integrity verification and content access control for named data networking, IEEE Trans on Information Forensics and Security, 10, 2, pp. 308-320, (2015)
- [3] Kazemian P., Varghese G., McKeown N., Header space analysis: Static checking for networks, Proc of USENIX NSDI'12, pp. 113-126, (2015)
- [4] Kazemian P., Chang M.H., Zeng H., Et al., Real time network policy checking using header space analysis, Proc of USENIX NSDI'13, pp. 99-111, (2013)
- [5] Khurshid A., Zou X., Zhou W., Et al., VeriFlow: Verifying network-wide invariants in real time, Proc of USENIX NSDI'13, pp. 15-27, (2013)
- [6] Voellmy A., Wang J., Yang Y.R., Et al., Maple: Simplifying SDN programming using algorithmic policies, Proc of ACM SIGCOMM'13, pp. 87-98, (2013)
- [7] Hu H., Han W., Ahn G.J., Et al., FLOWGUARD: Building robust firewalls for software-defined networks, Proc of ACM SIGCOMM Workshop HotSDN'14, pp. 97-102, (2014)
- [8] Porras P., Cheung S., Fong M., Et al., Securing the software-defined network control layer, Proc of ISOC NDSS'15, pp. 1-15, (2015)
- [9] Naous J., Walfish M., Nicolosi A., Et al., Verifying and enforcing network paths with ICING, Proc of ACM CoNEXT'11, pp. 1-12, (2011)
- [10] Liu X., Li A., Yang X., Et al., Passport: Secure and adoptable source authentication, Proc of USENIX NSDI'08, pp. 365-378, (2008)