This work is licensed under the Creative Commons Attribution 4.0 International License.
Priyadarsini, M., Bera, P., Das, S. K., Rahman, M. A. (2022). A security enforcement framework for SDN controller using game theoretic approach. IEEE Transactions on Dependable and Secure Computing, 20(2): 1500-1515.Search in Google Scholar
Ren, J., Li, J., Liu, H., Qin, T. (2021). Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT. Tsinghua Science and Technology, 27(4): 760-776.Search in Google Scholar
Glavan, A,. Gheorghica, D., Croitoru, V. (2023). Multi-access edge computing analysis of risks and security measures. Revue roumaine des sciences techniques—série électrotechnique et énergétique, 68(2): 206-211.Search in Google Scholar
Malkawi, R., Alsmadi, I., Aleroud, A. (2021). A firewall-adversarial testing approach for software defined networks. Journal of Theoretical and Applied Information Technology, 99(1): 227-241.Search in Google Scholar
Häckel, T., Meyer, P., Korf, F., Schmidt, T. (2022). Secure time-sensitive software-defined networking in vehicles. IEEE Transactions on Vehicular Technology, 72(1): 35-51.Search in Google Scholar
Aonzo, E., Neri, A. (2020). RESISTO: Resilience Enhancement and Risk Control Platform for Communications Infrastructure Operators. POLARIS Innovation Journal, (41): 13-15.Search in Google Scholar
Umar, R., Riadi, I., Kusuma, R. S. (2021). Mitigating sodinokibi ransomware attack on cloud network using software-defined networking (SDN). International Journal of Safety and Security Engineering, 11(3): 239-246.Search in Google Scholar
Benzaïd, C., Taleb, T., Farooqi, M. Z. (2021). Trust in 5G and beyond networks. IEEE Network, 35(3): 212-222.Search in Google Scholar
Ghimire, B., Rawat, D. B., Liu, C. (2021). Sharding-enabled blockchain for software-defined internet of unmanned vehicles in the battlefield. IEEE Network, 35(1): 101-107.Search in Google Scholar
Srivastava, V., Pandey, R. S. (2022). Load balancing for software-defined network: a review. International Journal of Computers and Applications, 44(8): 746-759.Search in Google Scholar
Abed, A. S., Khalil, B., Ibrahim, S. I., McAndrew, L. (2022). Development of an Integrate E-Medical System Using Software Defined Networking and Machine Learning. Webology, 19(1): 3410-8.Search in Google Scholar
Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., Bangash, Y. (2020). An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet of Things Journal, 7(10): 10250-10276.Search in Google Scholar
Batista, E., Figueiredo, G., Prazeres, C. (2022). Load balancing between fog and cloud in fog of things based platforms through software-defined networking. Journal of King Saud University-Computer and Information Sciences, 34(9): 7111-7125.Search in Google Scholar
AbdelAzim, N. M., Fahmy, S. F., Sobh, M. A., Eldin, A. S. (2021). A hybrid entropy-based DoS attacks detection system for software defined networks (SDN): A proposed trust mechanism. Egyptian Informatics Journal, 22(1): 85-90.Search in Google Scholar
Bhayo, J., Jafaq, R., Ahmed, A., Hameed, S., Shah, S. A. (2021). A time-efficient approach toward DDoS attack detection in IoT network using SDN. IEEE Internet of Things Journal, 9(5): 3612-3630.Search in Google Scholar
Shrestha, B., Lin, H. (2020). Data-centric edge computing to defend power grids against IoT-based attacks. Computer, 53(5): 35-43.Search in Google Scholar
John, S. J., Suma, P., Athira, T. M. (2022). Multiset modules. Journal of Computational and Cognitive Engineering, 1(1): 37-41.Search in Google Scholar
Sarkar, A., Biswas, A., Kundu, M. (2022). Development of q-Rung Orthopair Trapezoidal Fuzzy Einstein Aggregation Operators and Their Application in MCGDM Problems. Journal of Computational and Cognitive Engineering, 1(3): 109-121.Search in Google Scholar
Zaminkar, M., Fotohi, R. (2020). SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism. Wireless Personal Communications, 114(2): 1287-1312.Search in Google Scholar