:facetid:toc:\"db/series/ccn/ZSJH2017.bht\"OK:facetid:toc:db/series/ccn/ZSJH2017.bhtAbeer AliRichard CzivaSimon JouëtDimitrios P. PezarosSDNFV-Based DDoS Detection and Remediation in Multi-tenant, Virtualised Infrastructures.Guide to Security in SDN and NFV171-1962017Parts in Books or Collectionsclosedseries/ccn/AliCJP1710.1007/978-3-319-64653-4_7https://doi.org/10.1007/978-3-319-64653-4_7https://dblp.org/rec/series/ccn/AliCJP17URL#3011002Hamza AttakMarco Casassa MontCristian DávilaEleni-Constantina DavriCarolina FernandezGeorgios GardikisBernat GastónLudovic JacquinAntonio LioyAntonis LitkeNikolaos K. PapadakisDimitris PapadopoulosJerónimo NúñezEleni TrouvaSHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment.Guide to Security in SDN and NFV197-2252017Parts in Books or Collectionsclosedseries/ccn/AttakMDDFGGJLLPPNT1710.1007/978-3-319-64653-4_8https://doi.org/10.1007/978-3-319-64653-4_8https://dblp.org/rec/series/ccn/AttakMDDFGGJLLPPNT17URL#3011004Théo CombeWissam MallouliThibault CholezGuillaume DoyenBertrand MathieuEdgardo Montes de OcaAn SDN and NFV Use Case: NDN Implementation and Security Monitoring.Guide to Security in SDN and NFV299-3212017Parts in Books or Collectionsclosedseries/ccn/CombeMCDMO1710.1007/978-3-319-64653-4_12https://doi.org/10.1007/978-3-319-64653-4_12https://dblp.org/rec/series/ccn/CombeMCDMO17URL#3011006Jacob H. Cox Jr.Russell J. Clark 0001Henry L. Owen IIIA Security Policy Transition Framework for Software-Defined Networks.Guide to Security in SDN and NFV149-1692017Parts in Books or Collectionsclosedseries/ccn/CoxCO1710.1007/978-3-319-64653-4_6https://doi.org/10.1007/978-3-319-64653-4_6https://dblp.org/rec/series/ccn/CoxCO17URL#3011008Igor FaynbergSteve GoeringerNFV Security: Emerging Technologies and Standards.Guide to Security in SDN and NFV33-732017Parts in Books or Collectionsclosedseries/ccn/FaynbergG1710.1007/978-3-319-64653-4_2https://doi.org/10.1007/978-3-319-64653-4_2https://dblp.org/rec/series/ccn/FaynbergG17URL#3011012Doan B. HoangSarah FarahmandianSecurity of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing Technologies.Guide to Security in SDN and NFV3-322017Parts in Books or Collectionsclosedseries/ccn/HoangF1710.1007/978-3-319-64653-4_1https://doi.org/10.1007/978-3-319-64653-4_1https://dblp.org/rec/series/ccn/HoangF17URL#3011014Rahamatullah KhondokerPedro LarbigDirk ScheuermannFrank G. WeberKpatcha M. BayarouAddressing Industry 4.0 Security by Software-Defined Networking.Guide to Security in SDN and NFV229-2512017Parts in Books or Collectionsclosedseries/ccn/KhondokerLSWB1710.1007/978-3-319-64653-4_9https://doi.org/10.1007/978-3-319-64653-4_9https://dblp.org/rec/series/ccn/KhondokerLSWB17URL#3011016Antonio LioyTao SuAdrian L. ShawHamza AttakDiego R. LópezAntonio Pastor 0001Trust in SDN/NFV Environments.Guide to Security in SDN and NFV103-1242017Parts in Books or Collectionsclosedseries/ccn/LioySSALP1710.1007/978-3-319-64653-4_4https://doi.org/10.1007/978-3-319-64653-4_4https://dblp.org/rec/series/ccn/LioySSALP17URL#3011017Vinod K. MishraDinesh C. VermaChristopher Williams 0001Improving Security in Coalition Tactical Environments Using an SDN Approach.Guide to Security in SDN and NFV273-2982017Parts in Books or Collectionsclosedseries/ccn/MishraVW1710.1007/978-3-319-64653-4_11https://doi.org/10.1007/978-3-319-64653-4_11https://dblp.org/rec/series/ccn/MishraVW17URL#3011020Andrés F. Murillo P.Sandra Julieta RuedaLaura Victoria Morales MedinaAlvaro A. CárdenasSDN and NFV Security: Challenges for Integrated Solutions.Guide to Security in SDN and NFV75-1012017Parts in Books or Collectionsclosedseries/ccn/PRMC1710.1007/978-3-319-64653-4_3https://doi.org/10.1007/978-3-319-64653-4_3https://dblp.org/rec/series/ccn/PRMC17URL#3011022Antonio Pastor 0001Jesús FolgueiraPractical Experience in NFV Security Field: Virtual Home Gateway.Guide to Security in SDN and NFV127-1482017Parts in Books or Collectionsclosedseries/ccn/PastorF1710.1007/978-3-319-64653-4_5https://doi.org/10.1007/978-3-319-64653-4_5https://dblp.org/rec/series/ccn/PastorF17URL#3011024Mateus Augusto Silva SantosAlireza RanjbarGergely BiczókBarbara MartiniFrancesco PaolucciSecurity Requirements for Multi-operator Virtualized Network and Service Orchestration for 5G.Guide to Security in SDN and NFV253-2722017Parts in Books or Collectionsclosedseries/ccn/SantosRBMP1710.1007/978-3-319-64653-4_10https://doi.org/10.1007/978-3-319-64653-4_10https://dblp.org/rec/series/ccn/SantosRBMP17URL#3011026Shao Ying ZhuSandra Scott-HaywardLudovic JacquinRichard HillGuide to Security in SDN and NFV - Challenges, Opportunities, and ApplicationsGuide to Security in SDN and NFVComputer Communications and NetworksSpringer2017Editorshipseries/ccn/ZSJH201710.1007/978-3-319-64653-4https://doi.org/10.1007/978-3-319-64653-4https://dblp.org/rec/series/ccn/ZSJH2017URL#3014251