Seminar on Internet Technologies (Winter 2015/2016): Difference between revisions

No edit summary
Line 84: Line 84:
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| [http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p183.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p123.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p139.pdf]
| [http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p183.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p123.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p139.pdf]
|-
| '''Security issues in Software-defined Networking''' (Assigned to Amir Fazely)
The potential benefits of SDN are well-known and systems exploiting SDN are becoming omnipresent. While some of those exploit SDN features to improve the security of a service,
little research has been executed to secure SDN-enabled networks themselves. This topic will study potential attack vectors and defense mechanisms.
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| -
|-
|-
| '''Caching mechanisms in ICN-A survey'''(assigned to  Firoz Kabir)
| '''Caching mechanisms in ICN-A survey'''(assigned to  Firoz Kabir)