[HTML][HTML] Analysis of the use of artificial intelligence in software-defined intelligent networks: A survey
The distributed structure of traditional networks often fails to promptly and accurately provide
the computational power required for artificial intelligence (AI), hindering its practical …
the computational power required for artificial intelligence (AI), hindering its practical …
Developing an SDN security model (EnsureS) based on lightweight service path validation with batch hashing and tag verification
Software-defined networking (SDN) has significantly transformed the field of network
management through the consolidation of control and provision of enhanced adaptability …
management through the consolidation of control and provision of enhanced adaptability …
[HTML][HTML] A look into smart factory for Industrial IoT driven by SDN technology: A comprehensive survey of taxonomy, architectures, issues and future research …
NN Josbert, M Wei, W Ping, A Rafiq - Journal of King Saud University …, 2024 - Elsevier
Abstract The Internet of Things (IoT) provides a major contribution to the innovation of smart
manufacturing and industrial automation. Due to IoT, network devices and intelligent …
manufacturing and industrial automation. Due to IoT, network devices and intelligent …
Sdn-based automated rekey of ipsec security associations: design and practical validations
JA Parra-Espín, R Marín-López, G López-Millán… - Computer Networks, 2023 - Elsevier
Abstract The standard Request for Comments (RFC) 9061 defines a framework to
autonomously manage IPsec security associations (SAs) in SDN environments. The …
autonomously manage IPsec security associations (SAs) in SDN environments. The …
Detecting and mitigating security anomalies in Software-Defined Networking (SDN) using Gradient-Boosted Trees and Floodlight Controller characteristics
Cutting-edge and innovative software solutions are provided to address network security,
network virtualization, and other network-related challenges in highly congested SDN …
network virtualization, and other network-related challenges in highly congested SDN …
Detection of DDoS attacks in SDN-based VANET using optimized TabNet
MA Setitra, M Fan - Computer Standards & Interfaces, 2024 - Elsevier
Abstract Vehicular Ad Hoc Network (VANET) serves as a crucial component in developing
the Intelligent Transport System (ITS), which provides a range of services expected to …
the Intelligent Transport System (ITS), which provides a range of services expected to …
Establishment of IPsec Security Associations with Diffie–Hellman following a SDN-based framework: Analysis and practical validation
JA Parra-Espín, R Marín-López, G López-Millán - Computer Networks, 2024 - Elsevier
The centralized management of IPsec Security Associations (SAs) by using Software
Defined Network (SDN) paradigm has been already explored and standardized …
Defined Network (SDN) paradigm has been already explored and standardized …
A Lightweight Combined Physical Layer Encryption and Authentication Scheme for Industrial Internet of Things
J Wang, G Han, S Li, F Zhou, N Wang - IEEE Access, 2024 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) greatly facilitates industrial production and economic
development. However, it has more vulnerabilities facing the security issues introduced by …
development. However, it has more vulnerabilities facing the security issues introduced by …
[HTML][HTML] BSSN-SDNs: A Blockchain-Based Security Service Negotiation for the SDN Interdomain
Y Ma, C Chang, P Wu, J Xiao, L Yuan - Electronics, 2024 - mdpi.com
The security requirements for SDN (Software-Defined Network) cross-domain
communication are diverse and dynamically changing; thus, a security service negotiation …
communication are diverse and dynamically changing; thus, a security service negotiation …
Software Defined Networks
M Amanowicz, S Szwaczyk, K Wrona - Data-Centric Security in Software …, 2024 - Springer
The network infrastructure used in modern ICT systems consists of devices, individually
configured to process network packets. The disadvantage of such an approach is a …
configured to process network packets. The disadvantage of such an approach is a …