[1] |
左青云, 陈鸣, 王秀磊 , 等. 一种基于SDN的在线流量异常检测方法[J]. 西安电子科技大学学报, 2015,42(1):155-160.
doi: 10.3969/j.issn.1001-2400.2015.01.025
|
|
ZUO Qingyun, CHEN Ming, WANG Xiulei , et al. Online Traffic Anomaly Detection Method for SDN[J]. Journal of Xidian Univerisity, 2015,42(1):155-160.
doi: 10.3969/j.issn.1001-2400.2015.01.025
|
[2] |
LEE W, KIM N . Security Policy Scheme for an Efficient Security Architecture in Software-Defined Networking[J]. Information, 2017,8(2):65.
doi: 10.3390/info8020065
|
[3] |
LIU Y, ZHANG H Q, LIU J , et al. A New Approach for Delivering Customized Security Everywhere: Security Service Chain[J]. Security and Communication Networks, 2017,2017:9534754.
|
[4] |
SENDI A S, JARRAYA Y, POURZANDI M , et al. Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns[J]. IEEE Transactions on Services Computing, 2016, DOI 10.1109/TSC.2016.2616867.
doi: 10.1109/TSC.2016.2616867
|
[5] |
BASILE C, PITSCHEIDER C, RISSO F, et al. Towards the Dynamic Provision of Virtualized Security Services [C]// Communications in Computer and Information Science: 530. Heidelberg: Springer Verlag, 2015: 65-76.
|
[6] |
PARK Y, CHANDALIYA P, MURALIDHARAN A, et al. Dynamic Defense Provision via Network Functions Virtualization [C]// Proceedings of the 2017 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization. New York: ACM, 2017: 43-46.
|
[7] |
BONAKDARPOUR B, BOZGA M, JABER M , et al. A Framework for Automated Distributed Implementation of Component-based Models[J]. Distributed Computing, 2012,25(5):383-409.
doi: 10.1007/s00446-012-0168-6
|
[8] |
SAHHAF S, TAVERNIER W, ROST M , et al. Network Service Chaining with Optimized Network Function Embedding Supporting Service Decompositions[J]. Computer Networks, 2015,93:492-505.
doi: 10.1016/j.comnet.2015.09.035
|