1.
Oliveira, T.F.; Xavier-de-Souza, S.; Silveira, L.F. Improving Energy Efficiency on SDN Control-Plane Using Multi-Core Controllers. Energies, 14, 3161, 2021.
2.
Mohsin Masood, Mohamed Mostafa Fouad, Saleh Seyedzadeh and Ivan Glesk, “Energy Efficient Software Defined Networking Algorithm for Wireless Sensor Networks”, 13th International Scientific Conference on Sustainable, Modern and Safe Transport, 2019.
3.
Madhukrishna Priyadarsini, Padmalochan Bera, and Mohammad Ashiqur Rahman, “A New Approach for Energy Efficiency in Software Defined Network”, Fifth International Conference on Software Defined Systems (SDS), 2018.
4.
Thangaraj Ethilu, Abirami Sathappan, Paul Rodrigues, "Modified Deep Learning Methodology Based Malicious Intrusion Detection System in Software Defined Networking", International Journal of Computer Networks and Applications (IJCNA), 8(4), PP: 381-389, 2021, DOI: 10.22247/ijcna/2021/209704.
5.
Danda B. Rawat and Swetha R. Reddy, Software Defined Networking Architecture, Security and Energy Efficiency: A Survey,IEEE communication surveys and tutorials,2019.
6.
W. Meng, W. Li, Y. Xiang and K.-K.R. Choo. A Bayesian Inference-based Detection Mechanism to Defend Medical Smartphone Networks Against Insider Attacks. Journal of Network and Computer Applications, vol. 78, pp. 162-169, Elsevier, 2017.
7.
Rinki Gupta, Sreeraman Rajan, “Comparative Analysis of Convolution Neural Network Models for Continuous Indian Sign Language Classification”, Procedia Computer Science 171 (2020) 1542–1550.
8.
P. -W. Chi, M. -H. Wang and Y. Zheng, "SandboxNet: An Online Malicious SDN Application Detection Framework for SDN Networking," 2020 International Computer Symposium (ICS), 2020, pp. 397-402.
9.
Sebbar, A., ZKIK, K., Baddi, Y. MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context. J Ambient Intell Human Comput 11, 5875–5894 (2020).
10.
Nife, F.N., Kotulski, Z. Application-Aware Firewall Mechanism for Software Defined Networks. J Netw Syst Manage 28, 605–626 (2020).
11.
Neu C. V., Tatsch C. G., Lunardi R. C., Michelin R. A., Orozco A. M. S.,and Zorzo A. F.: Lightweight IPS for port scan in OpenFlow SDN networks. In NOMS 2018 IEEE/IFIP Network Operations and Manag. Symposium, Taipei, Taiwan, pp. 1–6, (2018).
12.
H. Naeem, B. Guo, and M. R. Naeem, ‘‘A light-weight malware static visual analysis for IoT infrastructure,’’ in Proc. Int. Conf. Artif. Intell. Big Data (ICAIBD), May 2018, pp. 240–244.
13.
H. Zhang, X. Xiao, F. Mercaldo, S. Ni, F. Martinelli, and A. K. Sangaiah, ‘‘Classification of ransomware families with machine learning based on N-Gram of opcodes,’’ Future Gener. Comput. Syst., vol. 90, pp. 211–221, Jan. 2019.
14.
A. Khalilian, A. Nourazar, M. Vahidi-Asl, and H. Haghighi, ‘‘G3MD: Mining frequent opcode sub-graphs for metamorphic malware detection of existing families,’’ Expert Syst. Appl., vol. 112, pp. 15–33, Dec. 2018.
15.
Y.-S. Liu, Y.-K. Lai, Z.-H. Wang, and H.-B. Yan, ‘‘A new learning approach to malware classification using discriminative feature extraction,’’ IEEE Access, vol. 7, pp. 13015–13023, 2019.
16.
Chang Y., and Lin T.: Cloud-clustered firewall with distributed SDN devices. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, pp. 1–5. (2018).
17.
J. Yan, Y. Qi, and Q. Rao, ‘‘Detecting malware with an ensemble method based on deep neural network,’’ Secur. Commun. Netw., vol. 2018, pp. 1–16, Mar. 2018.
18.
D. Gibert, C. Mateu, J. Planes, and R. Vicens, ‘‘Classification of malware by using structural entropy on convolutional neural networks,’’ in Proc. 32nd AAAI Conf. Artif. Intell., (AAAI), 30th Innov. Appl. Artif. Intell. (IAAI), 8th AAAI Symp. Educ. Adv. Artif. Intell. (EAAI), New Orleans, LA, USA, 2018, pp. 7759–7764.
19.
Z. Ma, L. Liu, W. Meng. Towards Multiple-Mix-Attack Detection via Consensus-based Trust Management in IoT Networks. Computers & Security, In press (2020).
20.
Y. Meng. The practice on using machine learning for network anomaly intrusion detection. The 2011 International Conference on Machine Learning and Cybernetics (ICMLC 2011), IEEE, pp. 576-581, 2011.
21.
Andrzej Kamisi?ski, Carol Fung,” FlowMon: Detecting Malicious Switches in Software-Defined Networks”, ACM CCS workshop on Automated Decision Making for Active Cyber Defense ,2015.
22.
Lis, A.; Sudolska, A.; Pietryka, I.; Kozakiewicz, A. Cloud Computing and Energy Efficiency: Mapping the Thematic Structure of Research. Energies 2020, 13, 4117.
23.
Aujla, G.S.; Kumar, N.; Zomaya, A.Y.; Ranjan, R. Optimal Decision Making for Big Data Processing at Edge-Cloud Environment: An SDN Perspective. IEEE Trans. Ind. Inform. 2018, 14, 778–789.
24.
Xu, G.; Dai, B.; Huang, B.; Yang, J.; Wen, S. Bandwidth-aware energy efficient flow scheduling with SDN in data center networks. Future Gener. Comput. Syst. 2017, 68, 163–174.
25.
Fernández-Fernández, A.; Cervelló-Pastor, C.; Ochoa-Aday, L. Energy Efficiency and Network Performance: A Reality Check in SDN-Based 5G Systems. Energies 2017.
26.
Son, J.; Dastjerdi, A.V.; Calheiros, R.N.; Buyya, R. SLA-Aware and Energy-Efficient Dynamic Overbooking in SDN-Based Cloud Data Centers. IEEE Trans. Sustain. Comput. 2017, 2, 76–89.