A survey on software-defined networking

W Xia, Y Wen, CH Foh, D Niyato… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Emerging mega-trends (eg, mobile, social, cloud, and big data) in information and
communication technologies (ICT) are commanding new challenges to future Internet, for …

Network monitoring in software-defined networking: A review

PW Tsai, CW Tsai, CW Hsu, CS Yang - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
Monitoring is an important concept in network management as it helps network operators to
determine the behavior of a network and the status of its components. Traffic engineering …

B4: Experience with a globally-deployed software defined WAN

S Jain, A Kumar, S Mandal, J Ong… - ACM SIGCOMM …, 2013 - dl.acm.org
We present the design, implementation, and evaluation of B4, a private WAN connecting
Google's data centers across the planet. B4 has a number of unique characteristics: i) …

MicroTE: Fine grained traffic engineering for data centers

T Benson, A Anand, A Akella, M Zhang - Proceedings of the seventh …, 2011 - dl.acm.org
The effects of data center traffic characteristics on data center traffic engineering is not well
understood. In particular, it is unclear how existing traffic engineering techniques perform …

Diagnosing network-wide traffic anomalies

A Lakhina, M Crovella, C Diot - ACM SIGCOMM computer …, 2004 - dl.acm.org
Anomalies are unusual and significant changes in a network's traffic levels, which can often
span multiple links. Diagnosing anomalies is critical for both network operators and end …

Applying deep learning approaches for network traffic prediction

R Vinayakumar, KP Soman… - … on Advances in …, 2017 - ieeexplore.ieee.org
Network traffic prediction aims at predicting the subsequent network traffic by using the
previous network traffic data. This can serve as a proactive approach for network …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

[图书][B] Quantum networking

R Van Meter - 2014 - books.google.com
Quantum networks build on entanglement and quantum measurement to achieve tasks that
are beyond the reach of classical systems. Using quantum effects, we can detect the …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …

Structural analysis of network traffic flows

A Lakhina, K Papagiannaki, M Crovella, C Diot… - Proceedings of the joint …, 2004 - dl.acm.org
Network traffic arises from the superposition of Origin-Destination (OD) flows. Hence, a
thorough understanding of OD flows is essential for modeling network traffic, and for …