| 665 | <a class="EntryGoto" id="Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan"></a> |
| 666 | <b class="myheading" style="position: relative; left: 5%;">Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan</b> |
| 667 | |
| 668 | <div class="BibEntry"> |
| 669 | |
| 670 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 671 | |
| 672 | |
| 673 | <tr> |
| 674 | <td valign="top">Author</td> |
| 675 | <td valign="top">Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan</td> |
| 676 | </tr> |
| 677 | |
| 678 | <tr> |
| 679 | <td valign="top">Title</td> |
| 680 | <td valign="top">GENI: A federated testbed for innovative network experiments</td> |
| 681 | </tr> |
| 682 | |
| 683 | <tr> |
| 684 | <td valign="top">Journal</td> |
| 685 | <td valign="top">Computer Networks</td> |
| 686 | </tr> |
| 687 | |
| 688 | <tr> |
| 689 | <td valign="top">Year</td> |
| 690 | <td valign="top">2014</td> |
| 691 | </tr> |
| 692 | |
| 693 | <tr> |
| 694 | <td valign="top">Abstract</td> |
| 695 | <td valign="top">GENI, the Global Environment for Networking Innovation, is a distributed virtual laboratory for transformative, at-scale experiments in network science, services, and security. Designed in response to concerns over Internet ossification, GENI is enabling a wide variety of experiments in a range of areas, including clean-slate networking, protocol design and evaluation, distributed service offerings, social network integration, content management, and in-network service deployment. Recently, GENI has been leading an effort to explore the potential of its underlying technologies, SDN and GENI racks, in support of university campus network management and applications. With the concurrent deployment of these technologies on regional and national R&E backbones, this will result in a revolutionary new national-scale distributed architecture, bringing to the entire network the shared, deeply programmable environment that the cloud has brought to the datacenter. This deeply programmable environment will support the GENI research mission and as well as enabling research in a wide variety of application areas.</td> |
| 696 | </tr> |
| 697 | |
| 698 | |
| 699 | |
| 700 | <tr> |
| 701 | <td valign="top">DOI</td> |
| 702 | <td valign="top">10.1016/j.bjp.2013.12.037</td> |
| 703 | </tr> |
| 704 | |
| 705 | |
| 706 | |
| 707 | <tr> |
| 708 | <td valign="top">URL</td> |
| 709 | <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.12.037">http://dx.doi.org/10.1016/j.bjp.2013.12.037</a></td> |
| 710 | </tr> |
| 711 | |
| 712 | |
| 713 | </table></div><br><br> |
| 714 | |
| 715 | |
| 716 | |
| 717 | |
| 4167 | <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td> |
| 4168 | </tr> |
| 4169 | |
| 4170 | <tr> |
| 4171 | <td valign="top">Year</td> |
| 4172 | <td valign="top">2012</td> |
| 4173 | </tr> |
| 4174 | |
| 4175 | |
| 4176 | |
| 4177 | <tr> |
| 4178 | <td valign="top">DOI</td> |
| 4179 | <td valign="top">10.1109/NOMS.2012.6211961</td> |
| 4180 | </tr> |
| 4181 | |
| 4182 | |
| 4183 | |
| 4184 | <tr> |
| 4185 | <td valign="top">URL</td> |
| 4186 | <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td> |
| 4187 | </tr> |
| 4188 | |
| 4189 | |
| 4190 | </table></div><br><br> |
| 4191 | |
| 4192 | |
| 4193 | <div class="BibEntry"> |
| 4194 | |
| 4195 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4196 | |
| 4197 | |
| 4198 | <tr> |
| 4199 | <td valign="top">Author</td> |
| 4200 | <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td> |
| 4201 | </tr> |
| 4202 | |
| 4203 | <tr> |
| 4204 | <td valign="top">Title</td> |
| 4205 | <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td> |
| 4206 | </tr> |
| 4207 | |
| 4208 | <tr> |
| 4209 | <td valign="top">Booktitle</td> |
4125 | | </tr> |
4126 | | |
4127 | | |
4128 | | |
4129 | | <tr> |
4130 | | <td valign="top">DOI</td> |
4131 | | <td valign="top">10.1109/NOMS.2012.6211961</td> |
4132 | | </tr> |
4133 | | |
4134 | | |
4135 | | |
4136 | | <tr> |
4137 | | <td valign="top">URL</td> |
4138 | | <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td> |
4139 | | </tr> |
4140 | | |
4141 | | |
4142 | | </table></div><br><br> |
4143 | | |
4144 | | |
4145 | | <div class="BibEntry"> |
4146 | | |
4147 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4148 | | |
4149 | | |
4150 | | <tr> |
4151 | | <td valign="top">Author</td> |
4152 | | <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td> |
4153 | | </tr> |
4154 | | |
4155 | | <tr> |
4156 | | <td valign="top">Title</td> |
4157 | | <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td> |
4158 | | </tr> |
4159 | | |
4160 | | <tr> |
4161 | | <td valign="top">Booktitle</td> |
4162 | | <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td> |
4163 | | </tr> |
4164 | | |
4165 | | <tr> |
4166 | | <td valign="top">Year</td> |
4167 | | <td valign="top">2012</td> |
| 8173 | <a class="EntryGoto" id="\\Ozçelik, İlker and Brooks, Richard R."></a> |
| 8174 | <b class="myheading" style="position: relative; left: 5%;">\\Ozçelik, İlker and Brooks, Richard R.</b> |
| 8175 | |
| 8176 | <div class="BibEntry"> |
| 8177 | |
| 8178 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 8179 | |
| 8180 | |
| 8181 | <tr> |
| 8182 | <td valign="top">Author</td> |
| 8183 | <td valign="top">\\Ozçelik, İlker and Brooks, Richard R.</td> |
| 8184 | </tr> |
| 8185 | |
| 8186 | <tr> |
| 8187 | <td valign="top">Title</td> |
| 8188 | <td valign="top">Operational System Testing for Designed in Security</td> |
| 8189 | </tr> |
| 8190 | |
| 8191 | <tr> |
| 8192 | <td valign="top">Booktitle</td> |
| 8193 | <td valign="top">Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop</td> |
| 8194 | </tr> |
| 8195 | |
| 8196 | <tr> |
| 8197 | <td valign="top">Location</td> |
| 8198 | <td valign="top">Oak Ridge, Tennessee</td> |
| 8199 | </tr> |
| 8200 | |
| 8201 | <tr> |
| 8202 | <td valign="top">Publisher</td> |
| 8203 | <td valign="top">ACM</td> |
| 8204 | </tr> |
| 8205 | |
| 8206 | <tr> |
| 8207 | <td valign="top">Address</td> |
| 8208 | <td valign="top">New York, NY, USA</td> |
| 8209 | </tr> |
| 8210 | |
| 8211 | <tr> |
| 8212 | <td valign="top">Year</td> |
| 8213 | <td valign="top">2013</td> |
| 8214 | </tr> |
| 8215 | |
| 8216 | <tr> |
| 8217 | <td valign="top">Abstract</td> |
| 8218 | <td valign="top">To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities.</td> |
| 8219 | </tr> |
| 8220 | |
| 8221 | |
| 8222 | |
| 8223 | <tr> |
| 8224 | <td valign="top">DOI</td> |
| 8225 | <td valign="top">10.1145/2459976.2460038</td> |
| 8226 | </tr> |
| 8227 | |
| 8228 | |
| 8229 | |
| 8230 | <tr> |
| 8231 | <td valign="top">URL</td> |
| 8232 | <td valign="top"><a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a></td> |
| 8233 | </tr> |
| 8234 | |
| 8235 | |
| 8236 | </table></div><br><br> |
| 8237 | |
| 8238 | |
| 8239 | |
| 8240 | |