Changes between Version 8 and Version 9 of GENIBibliography


Ignore:
Timestamp:
03/15/14 17:49:35 (10 years ago)
Author:
Mark Berman
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIBibliography

    v8 v9  
    88 * Research, experiments, services, and applications using GENI
    99
     10== Recognizing GENI in your work ==
     11
     12To help us track the impact of GENI, we have a simple request.
     13If you use GENI in your research or classroom, please say so in your published papers or other documents.
     14You may make this acknowledgement by citing the following paper:
     15
     16[http://www.sciencedirect.com/science/article/pii/S1389128613004507 GENI: A federated testbed for innovative network experiments].
     17
     18== Adding to this bibliographpy ==
     19
    1020We welcome your contributions to this bibliography. Please send references to [mailto:mberman@bbn.com Mark Berman] and [mailto:nriga@bbn.com Niky Riga]. Preferred formats are:
    1121
    1222 * URL for abstract on IEEE Explore, ACM Digital Library, or similar (e.g., http://dl.acm.org/citation.cfm?id=1568620)
    13  * Digital Object Identifier (DOI) (e.g., doi:10.1145/1568613.1568620)
     23 * Digital Object Identifier (DOI) (e.g., doi:10.1016/j.bjp.2013.12.037)
    1424 * BibTeX
    1525 * Other formats
     
    653663
    654664
     665<a class="EntryGoto" id="Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan"></a>
     666<b class="myheading" style="position: relative; left: 5%;">Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan</b>
     667
     668<div class="BibEntry">
     669
     670<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     671
     672
     673<tr>
     674     <td valign="top">Author</td>
     675     <td valign="top">Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan</td>
     676</tr>
     677
     678<tr>
     679     <td valign="top">Title</td>
     680     <td valign="top">GENI: A federated testbed for innovative network experiments</td>
     681</tr>
     682
     683<tr>
     684     <td valign="top">Journal</td>
     685     <td valign="top">Computer Networks</td>
     686</tr>
     687
     688<tr>
     689     <td valign="top">Year</td>
     690     <td valign="top">2014</td>
     691</tr>
     692
     693<tr>
     694     <td valign="top">Abstract</td>
     695     <td valign="top">GENI, the Global Environment for Networking Innovation, is a distributed virtual laboratory for transformative, at-scale experiments in network science, services, and security. Designed in response to concerns over Internet ossification, GENI is enabling a wide variety of experiments in a range of areas, including clean-slate networking, protocol design and evaluation, distributed service offerings, social network integration, content management, and in-network service deployment. Recently, GENI has been leading an effort to explore the potential of its underlying technologies, SDN and GENI racks, in support of university campus network management and applications. With the concurrent deployment of these technologies on regional and national R&#x0026;E backbones, this will result in a revolutionary new national-scale distributed architecture, bringing to the entire network the shared, deeply programmable environment that the cloud has brought to the datacenter. This deeply programmable environment will support the GENI research mission and as well as enabling research in a wide variety of application areas.</td>
     696</tr>
     697
     698
     699
     700<tr>
     701     <td valign="top">DOI</td>
     702     <td valign="top">10.1016/j.bjp.2013.12.037</td>
     703</tr>
     704
     705
     706
     707<tr>
     708     <td valign="top">URL</td>
     709     <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.12.037">http://dx.doi.org/10.1016/j.bjp.2013.12.037</a></td>
     710</tr>
     711
     712
     713</table></div><br><br>
     714
     715
     716
     717
    655718<a class="EntryGoto" id="Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas"></a>
    656719<b class="myheading" style="position: relative; left: 5%;">Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas</b>
     
    41024165<tr>
    41034166     <td valign="top">Booktitle</td>
     4167     <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td>
     4168</tr>
     4169
     4170<tr>
     4171     <td valign="top">Year</td>
     4172     <td valign="top">2012</td>
     4173</tr>
     4174
     4175
     4176
     4177<tr>
     4178     <td valign="top">DOI</td>
     4179     <td valign="top">10.1109/NOMS.2012.6211961</td>
     4180</tr>
     4181
     4182
     4183
     4184<tr>
     4185     <td valign="top">URL</td>
     4186     <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td>
     4187</tr>
     4188
     4189
     4190</table></div><br><br>
     4191
     4192
     4193<div class="BibEntry">
     4194
     4195<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4196
     4197
     4198<tr>
     4199     <td valign="top">Author</td>
     4200     <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td>
     4201</tr>
     4202
     4203<tr>
     4204     <td valign="top">Title</td>
     4205     <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td>
     4206</tr>
     4207
     4208<tr>
     4209     <td valign="top">Booktitle</td>
    41044210     <td valign="top">2012 IEEE Network Operations and Management Symposium</td>
    41054211</tr>
     
    41234229     <td valign="top">Abstract</td>
    41244230     <td valign="top">Autonomic management capabilities of the Future Internet can be provided through a recently proposed service architecture called NetServ. It consists of the interconnection of programmable nodes which enable dynamic deployment and execution of network and application services. This paper shows how this architecture can be further improved by introducing the OpenFlow architecture and implementing the OpenFlow controller as a NetServ service, thus improving both the NetServ management performance and its flexibility. These achievements are demonstrated experimentally on the GENI environment, showing the platform self-protecting capabilities in case of a SIP DoS attack.</td>
    4125 </tr>
    4126 
    4127 
    4128 
    4129 <tr>
    4130      <td valign="top">DOI</td>
    4131      <td valign="top">10.1109/NOMS.2012.6211961</td>
    4132 </tr>
    4133 
    4134 
    4135 
    4136 <tr>
    4137      <td valign="top">URL</td>
    4138      <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td>
    4139 </tr>
    4140 
    4141 
    4142 </table></div><br><br>
    4143 
    4144 
    4145 <div class="BibEntry">
    4146 
    4147 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4148 
    4149 
    4150 <tr>
    4151      <td valign="top">Author</td>
    4152      <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td>
    4153 </tr>
    4154 
    4155 <tr>
    4156      <td valign="top">Title</td>
    4157      <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td>
    4158 </tr>
    4159 
    4160 <tr>
    4161      <td valign="top">Booktitle</td>
    4162      <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td>
    4163 </tr>
    4164 
    4165 <tr>
    4166      <td valign="top">Year</td>
    4167      <td valign="top">2012</td>
    41684231</tr>
    41694232
     
    81088171
    81098172
     8173<a class="EntryGoto" id="\\Oz&#x63;&#x0327;elik, &#x49;&#x0307;lker and Brooks, Richard R."></a>
     8174<b class="myheading" style="position: relative; left: 5%;">\\Oz&#x63;&#x0327;elik, &#x49;&#x0307;lker and Brooks, Richard R.</b>
     8175
     8176<div class="BibEntry">
     8177
     8178<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     8179
     8180
     8181<tr>
     8182     <td valign="top">Author</td>
     8183     <td valign="top">\\Oz&#x63;&#x0327;elik, &#x49;&#x0307;lker and Brooks, Richard R.</td>
     8184</tr>
     8185
     8186<tr>
     8187     <td valign="top">Title</td>
     8188     <td valign="top">Operational System Testing for Designed in Security</td>
     8189</tr>
     8190
     8191<tr>
     8192     <td valign="top">Booktitle</td>
     8193     <td valign="top">Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop</td>
     8194</tr>
     8195
     8196<tr>
     8197     <td valign="top">Location</td>
     8198     <td valign="top">Oak Ridge, Tennessee</td>
     8199</tr>
     8200
     8201<tr>
     8202     <td valign="top">Publisher</td>
     8203     <td valign="top">ACM</td>
     8204</tr>
     8205
     8206<tr>
     8207     <td valign="top">Address</td>
     8208     <td valign="top">New York, NY, USA</td>
     8209</tr>
     8210
     8211<tr>
     8212     <td valign="top">Year</td>
     8213     <td valign="top">2013</td>
     8214</tr>
     8215
     8216<tr>
     8217     <td valign="top">Abstract</td>
     8218     <td valign="top">To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities.</td>
     8219</tr>
     8220
     8221
     8222
     8223<tr>
     8224     <td valign="top">DOI</td>
     8225     <td valign="top">10.1145/2459976.2460038</td>
     8226</tr>
     8227
     8228
     8229
     8230<tr>
     8231     <td valign="top">URL</td>
     8232     <td valign="top"><a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a></td>
     8233</tr>
     8234
     8235
     8236</table></div><br><br>
     8237
     8238
     8239
     8240
    81108241<br>
    81118242