Editor, Bureaucrats, Administrators
990
edits
No edit summary |
(→Topics) |
||
Line 84: | Line 84: | ||
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll] | | [http://user.informatik.uni-goettingen.de/~dkoll David Koll] | ||
| [http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p183.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p123.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p139.pdf] | | [http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p183.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p123.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p139.pdf] | ||
|- | |||
| '''Security issues in Software-defined Networking''' (Assigned to Amir Fazely) | |||
The potential benefits of SDN are well-known and systems exploiting SDN are becoming omnipresent. While some of those exploit SDN features to improve the security of a service, | |||
little research has been executed to secure SDN-enabled networks themselves. This topic will study potential attack vectors and defense mechanisms. | |||
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll] | |||
| - | |||
|- | |- | ||
| '''Caching mechanisms in ICN-A survey'''(assigned to Firoz Kabir) | | '''Caching mechanisms in ICN-A survey'''(assigned to Firoz Kabir) |