[1] S. Scott-Hayward, C. Kane, and S. Sezer, “Operationcheckpoint: SDN application control,” in Proceedings of the IEEE 22nd International Conference on Network Protocols, Oct 2014, pp. 618–623.
[2] S. Shin, Y. Song, T. Lee, S. Lee, J. Chung, P. Porras, V. Yegneswaran, J. Noh, and B. B. Kang, “Rosemary: A robust, secure, and high performance network operating system,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, ACM, 2014, pp. 78–89. [Online]. Available: http://doi.acm.org/10.1145/2660267.2660353
[3] X. Wen, B. Yang, Y. Chen, C. Hu, Y. Wang, B. Liu, and X. Chen, “SDNshield: Reconciliating configurable application permissions for SDN app markets,” in Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2016, pp. 121–132.
[4] P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, “A security enforcement kernel for Openflow networks,” in Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ACM, 2012, pp. 121–126. [Online]. Available: http://doi.acm.org/10.1145/2342441.2342466
[5] P. Porras, S. Cheung, M. Fong, K. Skinner, and V. Yegneswaran, “Securing the Software-Defined Network Control Layer,” in Proceedings of the Network and Distributed System Security Symposium (NDSS), February 2015.
Ciou, J. Y. (2016). 基於軟體定義網路於內部網路下之有效反欺騙方法應用於分散式阻斷攻擊防護 [master's thesis, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU201602212