A survey on software-defined networking
Emerging mega-trends (eg, mobile, social, cloud, and big data) in information and
communication technologies (ICT) are commanding new challenges to future Internet, for …
communication technologies (ICT) are commanding new challenges to future Internet, for …
Network monitoring in software-defined networking: A review
Monitoring is an important concept in network management as it helps network operators to
determine the behavior of a network and the status of its components. Traffic engineering …
determine the behavior of a network and the status of its components. Traffic engineering …
B4: Experience with a globally-deployed software defined WAN
S Jain, A Kumar, S Mandal, J Ong… - ACM SIGCOMM …, 2013 - dl.acm.org
We present the design, implementation, and evaluation of B4, a private WAN connecting
Google's data centers across the planet. B4 has a number of unique characteristics: i) …
Google's data centers across the planet. B4 has a number of unique characteristics: i) …
MicroTE: Fine grained traffic engineering for data centers
The effects of data center traffic characteristics on data center traffic engineering is not well
understood. In particular, it is unclear how existing traffic engineering techniques perform …
understood. In particular, it is unclear how existing traffic engineering techniques perform …
Diagnosing network-wide traffic anomalies
A Lakhina, M Crovella, C Diot - ACM SIGCOMM computer …, 2004 - dl.acm.org
Anomalies are unusual and significant changes in a network's traffic levels, which can often
span multiple links. Diagnosing anomalies is critical for both network operators and end …
span multiple links. Diagnosing anomalies is critical for both network operators and end …
Applying deep learning approaches for network traffic prediction
R Vinayakumar, KP Soman… - … on Advances in …, 2017 - ieeexplore.ieee.org
Network traffic prediction aims at predicting the subsequent network traffic by using the
previous network traffic data. This can serve as a proactive approach for network …
previous network traffic data. This can serve as a proactive approach for network …
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …
some embodiments, a method for detecting covert malware in a computing environ ment is …
[图书][B] Quantum networking
R Van Meter - 2014 - books.google.com
Quantum networks build on entanglement and quantum measurement to achieve tasks that
are beyond the reach of classical systems. Using quantum effects, we can detect the …
are beyond the reach of classical systems. Using quantum effects, we can detect the …
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …
Structural analysis of network traffic flows
Network traffic arises from the superposition of Origin-Destination (OD) flows. Hence, a
thorough understanding of OD flows is essential for modeling network traffic, and for …
thorough understanding of OD flows is essential for modeling network traffic, and for …