Forensic investigation of link fabrication attack in software defined networks / Suleman Khan
Software Defined Networking (SDN) is an emergent network architecture with a unique feature of decoupling an infrastructure plane from the control plane. SDN enables network-wide visibility to the applications running on top of the controller by executing a topology discovery module. However, the ad...
| Auteur principal: | Suleman , Khan |
|---|---|
| Format: | Thèse |
| Publié: |
2017
|
| Sujets: |
Documents similaires
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
par: Bilal , Ishfaq
Publié: (2016)
par: Bilal , Ishfaq
Publié: (2016)
Early detection and mitigation of DDoS attacks in software defined networks
par: Al-Saadi, Mustafa Yahya Zakariya
Publié: (2018)
par: Al-Saadi, Mustafa Yahya Zakariya
Publié: (2018)
Controller placement mechanism in software defined network using k-median algorithm
par: Fahad, Noor Saad
Publié: (2016)
par: Fahad, Noor Saad
Publié: (2016)
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
par: Hamid , Tahaei
Publié: (2018)
par: Hamid , Tahaei
Publié: (2018)
Software-defined routing protocol for mobile cognitive radio networks : a cross-layer perspective
par: Qusay Medhat, Salih
Publié: (2022)
par: Qusay Medhat, Salih
Publié: (2022)
Service based load balance mechanism using software-defined networks / Ahmed Abdelaziz Abdelltif Osman
par: Ahmed Abdelaziz, Abdelltif Osman
Publié: (2017)
par: Ahmed Abdelaziz, Abdelltif Osman
Publié: (2017)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
par: Adnan, -
Publié: (2016)
par: Adnan, -
Publié: (2016)
Analyzing performance of openstate in software defined network with multiple failures scenarios
par: Isyaku, Babangida
Publié: (2017)
par: Isyaku, Babangida
Publié: (2017)
Leveraging proactive flow to improve scalability in software defined networking / Oseghale Osemudiamen Victor
par: Oseghale , Osemudiamen Victor
Publié: (2019)
par: Oseghale , Osemudiamen Victor
Publié: (2019)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
par: Mosa, Mohammad Rasmi Hassun
Publié: (2013)
par: Mosa, Mohammad Rasmi Hassun
Publié: (2013)
A secure method to detect wormhole attack in mobile adhoc network
par: Ardestani, Parichehr Manouchehri
Publié: (2013)
par: Ardestani, Parichehr Manouchehri
Publié: (2013)
Speech features analysis of the joint speech separation and automatic speech recognition model / Tawseef Khan
par: Tawseef , Khan
Publié: (2021)
par: Tawseef , Khan
Publié: (2021)
An extended access control list for local network protection from insider attacks
par: Muamer N., Mohammed
Publié: (2011)
par: Muamer N., Mohammed
Publié: (2011)
Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc network
par: Bojnord, Hoda Soltanian
Publié: (2013)
par: Bojnord, Hoda Soltanian
Publié: (2013)
Analyzing network flows by applying fuzzy logic to detect denial of service attack (DOS)
par: Tabatabaei, Seyedeh Farzaneh
Publié: (2010)
par: Tabatabaei, Seyedeh Farzaneh
Publié: (2010)
Network monitoring and reporting system for Telekom Malaysia streamyx links
par: Elias, Aswan
Publié: (2004)
par: Elias, Aswan
Publié: (2004)
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
par: Nauman , Khan
Publié: (2024)
par: Nauman , Khan
Publié: (2024)
Analysis of web worm attack on web application
par: Mohd. Ghazzali, Amalina
Publié: (2008)
par: Mohd. Ghazzali, Amalina
Publié: (2008)
Simplified database forensic investigation using metamodeling approach
par: Al-Dhaqm, Arafat Mohammed Rashad
Publié: (2019)
par: Al-Dhaqm, Arafat Mohammed Rashad
Publié: (2019)
QoS enabled cross-layered clustering for mitigating flooding queries in internet of thing networks / Fawad Ali Khan
par: Fawad , Ali Khan
Publié: (2022)
par: Fawad , Ali Khan
Publié: (2022)
An automated framework for software test oracle based on multi-networks
par: Shahamiri, Seyed Reza
Publié: (2011)
par: Shahamiri, Seyed Reza
Publié: (2011)
OFDPv2 : an efficient protocol for topology discovery in openflow-based software defined networking
par: Tanko, Abubakar Musa AlKali
Publié: (2017)
par: Tanko, Abubakar Musa AlKali
Publié: (2017)
Open source forensic tools for linux hard disk investigation
par: Amin Maree, Bashar (Moh'd Walid)
Publié: (2010)
par: Amin Maree, Bashar (Moh'd Walid)
Publié: (2010)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
par: Raenu , Kolandaisamy
Publié: (2020)
par: Raenu , Kolandaisamy
Publié: (2020)
Digital forensic data collection in cloud computing using logic model
par: Khairul Afandy Abu Bakar
Publié: (2012)
par: Khairul Afandy Abu Bakar
Publié: (2012)
Effective software fault localization based on complex network theory / Abubakar Zakari
par: Abubakar , Zakari
Publié: (2019)
par: Abubakar , Zakari
Publié: (2019)
Client to client attacks protection in cloud computing by a secure virtualization model
par: Abadi, Ahad Akbar
Publié: (2013)
par: Abadi, Ahad Akbar
Publié: (2013)
Enhancing the robustness of digital video watermarking for copyright protection against collusion attack
par: Boroujerdizadeh, Ali
Publié: (2013)
par: Boroujerdizadeh, Ali
Publié: (2013)
Improve the accuracy rate of link quality estimation using fuzzy logic in mobile wireless sensor networks / Huang Zhirui
par: Huang , Zhirui
Publié: (2019)
par: Huang , Zhirui
Publié: (2019)
A model for validation and verification of disk imaging in computer forensic investigation
par: Palaniappan, P. Siva Shamala
Publié: (2009)
par: Palaniappan, P. Siva Shamala
Publié: (2009)
A secure method against frequency attack for pattern query on encrypted string data
par: Ravan, Rama Roshan
Publié: (2013)
par: Ravan, Rama Roshan
Publié: (2013)
Deep Q-network for just-in-time software defect prediction / Ahmad Muhaimin Ismail
par: Ahmad Muhaimin , Ismail
Publié: (2023)
par: Ahmad Muhaimin , Ismail
Publié: (2023)
Easy link information centre administrator (ELICA)
par: Sapiee, Md. Suhaimi
Publié: (2003)
par: Sapiee, Md. Suhaimi
Publié: (2003)
A secure virtualization model for cloud computing to defend against distributed denial-of service attacks
par: Farahmandian, Sara
Publié: (2013)
par: Farahmandian, Sara
Publié: (2013)
Data prediction and recalculation of missing data in soft set / Muhammad Sadiq Khan
par: Muhammad Sadiq , Khan
Publié: (2018)
par: Muhammad Sadiq , Khan
Publié: (2018)
Secure address resolution protocol proxy in software defined network
par: Munther, Munther Numan
Publié: (2018)
par: Munther, Munther Numan
Publié: (2018)
Enhancement of serins to mitigate passive wormhole attack in wireless sensor networks
par: Modirkhazeni, Ali
Publié: (2011)
par: Modirkhazeni, Ali
Publié: (2011)
Software-in-the-loop testing for product testing software in label test process
par: Tan, Chester Laurence Barcelon
Publié: (2018)
par: Tan, Chester Laurence Barcelon
Publié: (2018)
Software requirement change effort estimation model for software development phase
par: Shah, Jalal
Publié: (2018)
par: Shah, Jalal
Publié: (2018)
Investigating the Impact of Different Representations of Data on Neural Network and Regression
par: Fallah, Ehab A. Omer El
Publié: (2008)
par: Fallah, Ehab A. Omer El
Publié: (2008)
Documents similaires
-
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
par: Bilal , Ishfaq
Publié: (2016) -
Early detection and mitigation of DDoS attacks in software defined networks
par: Al-Saadi, Mustafa Yahya Zakariya
Publié: (2018) -
Controller placement mechanism in software defined network using k-median algorithm
par: Fahad, Noor Saad
Publié: (2016) -
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
par: Hamid , Tahaei
Publié: (2018) -
Software-defined routing protocol for mobile cognitive radio networks : a cross-layer perspective
par: Qusay Medhat, Salih
Publié: (2022)