{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:57:13Z","timestamp":1775145433027,"version":"3.50.1"},"reference-count":188,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000144","name":"U.S. National Science Foundation (NSF) CAREER","doi-asserted-by":"publisher","award":["CNS-1650831"],"award-info":[{"award-number":["CNS-1650831"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1658972"],"award-info":[{"award-number":["CNS-1658972"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/comst.2016.2618874","type":"journal-article","created":{"date-parts":[[2016,10,19]],"date-time":"2016-10-19T18:14:36Z","timestamp":1476900876000},"page":"325-346","source":"Crossref","is-referenced-by-count":296,"title":["Software Defined Networking Architecture, Security and Energy Efficiency: A Survey"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3638-3464","authenticated-orcid":false,"given":"Danda B.","family":"Rawat","sequence":"first","affiliation":[]},{"given":"Swetha R.","family":"Reddy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2014.6969028"},{"key":"ref172","article-title":"Virtual machine placement for energy efficiency and QoS in software defined datacenter networks","author":"wang","year":"2013"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2371014"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2014.6968985"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848112"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-014-0775-8"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1145\/1477942.1477944"},{"key":"ref178","volume":"11997","author":"keshav","year":"1997","journal-title":"An Engineering Approach to Computer Networking ATM Networks the Internet and the Telephone Network"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2491714"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342373"},{"key":"ref169","author":"kakadia","year":"2012","journal-title":"Energy Efficient Data Center Networks&#x2014;A SDN Based Approach"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/65.690959"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159916"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602219"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282382"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096541"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1016707.1016709"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/65.690958"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/OPNARC.1998.662048"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/DANCE.2002.1003480"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35279-4_17"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00269-4"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039866"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553676"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626307"},{"key":"ref183","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/ICNP.2003.1249762","article-title":"Packet classification using extended TCAMs","author":"spitznagel","year":"2003","journal-title":"Proc 11th IEEE Int Conf Netw Protocols"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620734"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007683"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838365"},{"key":"ref186","article-title":"SDN: Evolution and opportunities in the development IoT applications","volume":"2014","author":"caraguay","year":"2014","journal-title":"Int J Distrib Sens Netw"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.006"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453114"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3272"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.011"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2755977"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918982"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2016.7506770"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14257\/ijca.2014.7.6.37"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CHINACOM.2014.7054385"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081075"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5120\/12843-0195"},{"key":"ref100","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","volume":"99","author":"roesch","year":"1999","journal-title":"Proc LISA"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.7763\/JOCET.2013.V1.63"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2352118"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1899928.1899945"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.31"},{"key":"ref153","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-642-36516-4_4","article-title":"FlowSense: Monitoring network utilization with zero measurement cost","author":"yu","year":"2013","journal-title":"Passive and Active Measurement"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079304"},{"key":"ref155","first-page":"29","article-title":"Software defined traffic measurement with OpenSketch","volume":"13","author":"yu","year":"2013","journal-title":"Proc NSDI"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2394457"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838227"},{"key":"ref151","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-642-12334-4_21","article-title":"OpenTM: Traffic matrix estimator for OpenFlow networks","author":"tootoonchian","year":"2010","journal-title":"Passive and Active Measurement"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342446"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.90"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970717"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/s11107-010-0287-6"},{"key":"ref59","article-title":"Modular SDN programming with pyretic","author":"reich","year":"2013"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.144"},{"key":"ref57","first-page":"1","article-title":"VCP: A virtualization cloud platform for SDN intra-domain production network","author":"lin","year":"2012","journal-title":"Proc 20th IEEE Int Conf Netw Protocols (ICNP)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2013.19"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2413247.2413251"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6134525"},{"key":"ref53","article-title":"FlowVisor: A network virtualization layer","author":"sherwood","year":"2009"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2014.2300365"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref167","article-title":"Rule-caching algorithms for software-defined networks","author":"katta","year":"2014"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7166189"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037187"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2014.6914313"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566832"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2165323"},{"key":"ref161","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/978-3-642-35668-1_32","article-title":"Compact TCAM: Flow entry compaction in TCAM for power aware SDN","author":"kannan","year":"2013","journal-title":"Distributed Computing and Networking"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375857"},{"key":"ref4","first-page":"30","article-title":"Software-defined networking","volume":"17","author":"mckeown","year":"2009","journal-title":"INFOCOM Keynote Talk"},{"key":"ref3","author":"goransson","year":"2014","journal-title":"Software Defined Networks A Comprehensive Approach"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2326417"},{"key":"ref5","author":"nadeau","year":"2013","journal-title":"SDN Software Defined Networks"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491214"},{"key":"ref8","year":"2016","journal-title":"Open Networking Foundation"},{"key":"ref49","first-page":"1","article-title":"Composing software defined networks","author":"monsanto","year":"2013","journal-title":"Proc NSDI"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref157","first-page":"99","article-title":"Real time network policy checking using header space analysis","author":"kazemian","year":"2013","journal-title":"Proc NSDI"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342454"},{"key":"ref9","year":"2016","journal-title":"Floodlight"},{"key":"ref46","year":"2015","journal-title":"Defining Openness for Open SDN and NFV"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342451"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070569"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342458"},{"key":"ref42","year":"2016","journal-title":"SDN-Ready White Box Data Center"},{"key":"ref41","first-page":"1","article-title":"Software-defined networks and OpenFlow","volume":"16","author":"stallings","year":"2013","journal-title":"Internet Protocol J"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-3-642-18378-2_19","article-title":"Nettle: Taking the sting out of programming network routers","author":"voellmy","year":"2011","journal-title":"Practical Aspects of Declarative Languages"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.016"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.01.016"},{"key":"ref125","first-page":"599","article-title":"A flow-based method for abnormal network traffic detection","volume":"1","author":"kim","year":"2004","journal-title":"Proc IEEE\/IFIP Netw Operat Manag Symp"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1867"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2396556.2396598"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.4108\/icst.5gu.2014.258123"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733671"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2347048"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.026"},{"key":"ref70","first-page":"61","article-title":"Leveraging SDN for the 5G networks","author":"berthou","year":"2015","journal-title":"Software Defined Mobile Networks (SDMN) Beyond LTE Network Architecture"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1109\/BlackSeaCom.2015.7185103","article-title":"SDN orchestration and virtualization of heterogeneous multi-domain and multi-layer transport networks: The STRAUSS approach","author":"mu\u00f1oz","year":"2015","journal-title":"Proc IEEE Int Black Sea Conf Commun Netw (BlackSeaCom)"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342453"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2014.31"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/2609908.2609948","article-title":"meSDN: Mobile extension of SDN","author":"lee","year":"2014","journal-title":"Proc 5th Int Workshop Mobile Cloud Comput Services"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/1614293.1614304"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.14722\/sent.2014.23002"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6779061"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2014.7063427"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491222"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575320"},{"key":"ref136","first-page":"1","article-title":"Energy-efficient management of data center resources for cloud computing: A vision, architectural elements, and open challenges","author":"buyya","year":"2010","journal-title":"Proc Green Cloud"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.150"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014156"},{"key":"ref137","first-page":"268","article-title":"State-of-the-art energy efficiency approaches in software defined networking","author":"assefa","year":"2015","journal-title":"Proc ICN"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140316"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2992"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/PHOSST.2013.6614478"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1364\/OE.22.000055"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2013.6710551"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"ref140","first-page":"19","article-title":"Hedera: Dynamic flow scheduling for data center networks","volume":"10","author":"al-fares","year":"2010","journal-title":"Proc NSDI"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.06.002"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934956"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018466"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1145\/2740070.2626300","article-title":"SDX: A software defined Internet exchange","author":"gupta","year":"2014","journal-title":"Proc ACM Conf SIGCOMM"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851224"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390241"},{"key":"ref144","first-page":"3","article-title":"HyperFlow: A distributed control plane for OpenFlow","author":"tootoonchian","year":"2010","journal-title":"Proc USENIX Internet Netw Manage Conf Res Enterprise Netw"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1201\/b19290"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2014.6799479"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2012.6664282"},{"key":"ref1","author":"jeschke","year":"2016","journal-title":"Industrial Internet of Things Cyber-Manufacturing Systems"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491203"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2014.24"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620749"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/GREE.2013.24"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23064"},{"key":"ref93","first-page":"203","article-title":"Anomaly traceback using software defined networking","author":"fran\u00e7ois","year":"2015","journal-title":"Proc Nat Conf Parallel Comput Technol (PARCOMPTECH)"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.5.12"},{"key":"ref92","first-page":"208","article-title":"An AMI threat detection mechanism based on SDN networks","author":"chi","year":"2014","journal-title":"Proc SECURWARE"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23283"},{"key":"ref91","first-page":"1","article-title":"CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)","author":"shin","year":"2012","journal-title":"Proc 20th IEEE Int Conf Netw Protocols (ICNP)"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014199"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"ref102","article-title":"Internet denial of service attacks and defense mechanisms","author":"abliz","year":"2011"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491223"},{"key":"ref112","first-page":"127","article-title":"A NICE way to test OpenFlow applications","volume":"12","author":"canini","year":"2012","journal-title":"Proc NSDI"},{"key":"ref110","first-page":"1","article-title":"Practical and incremental convergence between SDN and middleboxes","author":"qazi","year":"2013","journal-title":"Proc Open Netw Summit"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.8"},{"key":"ref99","first-page":"1","article-title":"An architecture for intrusion prevention using software defined networks","author":"lobato","year":"2013","journal-title":"Proc WNetVirt"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2014.6876752"},{"key":"ref97","first-page":"1","article-title":"Towards autonomic DDoS mitigation using software defined networking","author":"sahay","year":"2015","journal-title":"Proc NDSS Workshop Security Emerging Netw Technol"},{"key":"ref10","year":"2016","journal-title":"OpenDaylight"},{"key":"ref11","author":"mckeown","year":"2011","journal-title":"OpenFlow Switch Specification"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014181"},{"key":"ref13","first-page":"1","article-title":"Building a transparent intrusion detection and prevention system on SDN","volume":"7","author":"joldzic","year":"2014","journal-title":"Norsk Informasjonssikkerhetkonferanse"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-23644-0_9","article-title":"Revisiting traffic anomaly detection using software defined networking","author":"mehdi","year":"2011","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref15","first-page":"1","article-title":"FRESCO: Modular composable security services for software-defined networks","author":"shin","year":"2013","journal-title":"Proc NDSS"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2016.7506769"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/952589.952601"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"ref81","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-15299-8","author":"rawat","year":"2015","journal-title":"Dynamic Spectrum Access for Wireless Networks"},{"key":"ref18","author":"rawat","year":"2016","journal-title":"Vehicular Cyber Physical Systems Adaptive Connectivity and Security"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7096298"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2016.7506640"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491207"},{"key":"ref114","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-540-30143-1_4","article-title":"Fast detection of scanning worm infections","author":"schechter","year":"2004","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330148"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2012.19"},{"key":"ref115","first-page":"20","article-title":"Implementing and testing a virus throttle","author":"twycross","year":"2003","journal-title":"Proc Usenix Security"},{"key":"ref120","first-page":"79","article-title":"Splendid isolation: Language-based security for software-defined networks","author":"schlesinger","year":"2012","journal-title":"Proc of the First Workshop on Hot Topics in Software Defined Networks"},{"key":"ref89","first-page":"249","article-title":"ElasticTree: Saving energy in data center networks","volume":"10","author":"heller","year":"2010","journal-title":"Proc NSDI"},{"key":"ref121","first-page":"639","article-title":"LinesWitch: Efficiently managing switch flow in software-defined networking while effectively tackling DoS attacks","author":"ambrosin","year":"2015","journal-title":"Proc 10th ACM Symp Inf Comput Commun"},{"key":"ref122","author":"dover","year":"2016","journal-title":"A Denial of Service Attack Against the Open Floodlight SDN Controller"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010528"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2491732"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.113010.00106"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2011.6076935"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/9739\/7862305\/7593247-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/7862305\/07593247.pdf?arnumber=7593247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T17:50:00Z","timestamp":1749664200000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7593247\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":188,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2016.2618874","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}