Secure software-defined networking communication systems for smart cities: Current status, challenges, and trends

M Rahouti, K **ong, Y **n - IEEE Access, 2020 - ieeexplore.ieee.org
Smart city is a transformative and progressive vision that aims to revolutionize infrastructure
systems and public services in an urban area with modern information technologies. Its …

[HTML][HTML] Misconfiguration in firewalls and network access controls: Literature review

M Alicea, I Alsmadi - Future Internet, 2021 - mdpi.com
Firewalls and network access controls play important roles in security control and protection.
Those firewalls may create an incorrect sense or state of protection if they are improperly …

Toward scalable graph-based security analysis for cloud networks

A Sabur, A Chowdhary, D Huang, A Alshamrani - Computer Networks, 2022 - Elsevier
Cloud-based systems and services are seeing exponential growth in the last few years.
Many companies and digital services are actively migrating their storage and computational …

Side-effects causing hidden conflicts in software-defined networks

V Danciu, CN Tran - SN Computer Science, 2020 - Springer
Abstract The Software-Defined Networking (SDN) architecture facilitates the flexible
deployment of network functions by detaching them from network devices to a logically …

Exploring the landscape of software defined networking: A comprehensive survey of applications, challenges, and future directions

A Nadhum, A Al-Saadi - AIP Conference Proceedings, 2025 - pubs.aip.org
SDN is a next-gen networking method which allows us to centrally control and manage
network resources and traffic. It also provides a range of services and benefits, especially in …

Towards Scalable Security State Management in The Cloud

A Sabur - 2023 - search.proquest.com
Modern data center networks require efficient and scalable security analysis approaches
that can analyze the relationship between the vulnerabilities. Utilizing the Attack …

Software-defined Situation-aware Cloud Security

A Chowdhary - 2020 - search.proquest.com
The use of reactive security mechanisms in enterprise networks can, at times, provide an
asymmetric advantage to the attacker. Similarly, the use of a proactive security mechanism …