Abstract is missing.
- Machine Learning-Based Detection of Ransomware Using SDNGreg Cusack, Oliver Michel, Eric Keller. 1-6 [doi]
- Identifying Anomalies in GridFTP transfers for Data-Intensive Science through Application-AwarenessDeepak Nadig Anantha, Byrav Ramamurthy, Brian Bockelman, David Swanson. 7-12 [doi]
- Enabling a Resilient and Self-healing PMU Infrastructure Using Centralized Network ControlYanfeng Qu, Xin Liu, Dong Jin, Yuan Hong, Chen Chen. 13-18 [doi]
- Internet Security Liberated via Software Defined ExchangesKuang-Ching Wang, Richard R. Brooks, C. Geddings Barrineau, Jonathan Oakley 0001, Lu Yu, Qing Wang. 19-22 [doi]
- Dressed up: Baiting Attackers through Endpoint Service ProjectionMarc Ph. Stoecklin, Jialong Zhang, Frederico Araujo, Teryl Taylor. 23-28 [doi]
- Cybersecurity Challenges and Opportunities in the New "Edge Computing + IoT" WorldJianli Pan, Zhicheng Yang. 29-32 [doi]
- Challenges and Preparedness of SDN-based FirewallsVaibhav Hemant Dixit, Sukhwa Kyung, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn. 33-38 [doi]
- Challenges Towards Protecting VNF With SGXJuan Wang, Shirong Hao, Yi Li, Chengyang Fan, Jie Wang, Lin Han, Zhi-hong, Hongxin Hu. 39-42 [doi]
- MTD Analysis and evaluation framework in Software Defined Network (MASON)Ankur Chowdhary, Adel Alshamrani, Dijiang Huang, Hongbin Liang. 43-48 [doi]
- Database Criteria for Network Policy ChainAnduo Wang. 49-54 [doi]
- Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic WinnowingHongda Li, Fuqiang Zhang, Lu Yu, Jon Oakley, Hongxin Hu, Richard R. Brooks. 55-58 [doi]