You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1216 lines
33 KiB
1216 lines
33 KiB
% $ biblatex auxiliary file $
|
|
% $ biblatex bbl format version 3.2 $
|
|
% Do not modify the above lines!
|
|
%
|
|
% This is an auxiliary file used by the 'biblatex' package.
|
|
% This file may safely be deleted. It will be recreated as
|
|
% required.
|
|
%
|
|
\begingroup
|
|
\makeatletter
|
|
\@ifundefined{ver@biblatex.sty}
|
|
{\@latex@error
|
|
{Missing 'biblatex' package}
|
|
{The bibliography requires the 'biblatex' package.}
|
|
\aftergroup\endinput}
|
|
{}
|
|
\endgroup
|
|
|
|
\datalist[entry]{nyt/global//global/global}
|
|
\entry{AlexeyKuznetsov.2011}{misc}{}
|
|
\name{author}{1}{}{%
|
|
{{hash=A}{%
|
|
family={{Alexey Kuznetsov}},
|
|
familyi={A\bibinitperiod},
|
|
}}%
|
|
}
|
|
\list{publisher}{1}{%
|
|
{{The Linux Foundation}}%
|
|
}
|
|
\strng{namehash}{A1}
|
|
\strng{fullhash}{A1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2011}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{A}
|
|
\field{sortinithash}{A}
|
|
\field{title}{iproute2}
|
|
\verb{url}
|
|
\verb https://wiki.linuxfoundation.org/networking/iproute2
|
|
\endverb
|
|
\field{year}{2011}
|
|
\field{urlday}{16}
|
|
\field{urlmonth}{05}
|
|
\field{urlyear}{2022}
|
|
\endentry
|
|
|
|
\entry{Alharbi.2017}{inproceedings}{}
|
|
\name{author}{3}{}{%
|
|
{{hash=AT}{%
|
|
family={Alharbi},
|
|
familyi={A\bibinitperiod},
|
|
given={Talal},
|
|
giveni={T\bibinitperiod},
|
|
}}%
|
|
{{hash=LS}{%
|
|
family={Layeghy},
|
|
familyi={L\bibinitperiod},
|
|
given={Siamak},
|
|
giveni={S\bibinitperiod},
|
|
}}%
|
|
{{hash=PM}{%
|
|
family={Portmann},
|
|
familyi={P\bibinitperiod},
|
|
given={Marius},
|
|
giveni={M\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{ATLSPM1}
|
|
\strng{fullhash}{ATLSPM1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2017}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{A}
|
|
\field{sortinithash}{A}
|
|
\field{booktitle}{2017 27th International Telecommunication Networks and
|
|
Applications Conference (ITNAC)}
|
|
\verb{doi}
|
|
\verb 10.1109/ATNAC.2017.8215424
|
|
\endverb
|
|
\field{pages}{1\bibrangedash 6}
|
|
\field{title}{Experimental evaluation of the impact of DoS attacks in SDN}
|
|
\field{year}{2017}
|
|
\endentry
|
|
|
|
\entry{Ayuso.2019}{misc}{}
|
|
\name{author}{6}{}{%
|
|
{{hash=APN}{%
|
|
family={Ayuso},
|
|
familyi={A\bibinitperiod},
|
|
given={Pablo\bibnamedelima Neira},
|
|
giveni={P\bibinitperiod\bibinitdelim N\bibinitperiod},
|
|
}}%
|
|
{{hash=KJ}{%
|
|
family={Kadlecsik},
|
|
familyi={K\bibinitperiod},
|
|
given={Jozsef},
|
|
giveni={J\bibinitperiod},
|
|
}}%
|
|
{{hash=LE}{%
|
|
family={Leblond},
|
|
familyi={L\bibinitperiod},
|
|
given={Eric},
|
|
giveni={E\bibinitperiod},
|
|
}}%
|
|
{{hash=WF}{%
|
|
family={Westphal},
|
|
familyi={W\bibinitperiod},
|
|
given={Florian},
|
|
giveni={F\bibinitperiod},
|
|
}}%
|
|
{{hash=GAB}{%
|
|
family={Gonz{\'a}lez},
|
|
familyi={G\bibinitperiod},
|
|
given={Arturo\bibnamedelima Borrero},
|
|
giveni={A\bibinitperiod\bibinitdelim B\bibinitperiod},
|
|
}}%
|
|
{{hash=SP}{%
|
|
family={Sutter},
|
|
familyi={S\bibinitperiod},
|
|
given={Phil},
|
|
giveni={P\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{APN+1}
|
|
\strng{fullhash}{APNKJLEWFGABSP1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2019}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{A}
|
|
\field{sortinithash}{A}
|
|
\field{title}{nftables}
|
|
\verb{url}
|
|
\verb https://netfilter.org/projects/nftables/
|
|
\endverb
|
|
\list{location}{1}{%
|
|
{n.p.}%
|
|
}
|
|
\field{year}{2019}
|
|
\field{urlday}{10}
|
|
\field{urlmonth}{05}
|
|
\field{urlyear}{2022}
|
|
\endentry
|
|
|
|
\entry{Bosshart.2014}{article}{}
|
|
\name{author}{11}{}{%
|
|
{{hash=BP}{%
|
|
family={Bosshart},
|
|
familyi={B\bibinitperiod},
|
|
given={Pat},
|
|
giveni={P\bibinitperiod},
|
|
}}%
|
|
{{hash=DD}{%
|
|
family={Daly},
|
|
familyi={D\bibinitperiod},
|
|
given={Dan},
|
|
giveni={D\bibinitperiod},
|
|
}}%
|
|
{{hash=GG}{%
|
|
family={Gibb},
|
|
familyi={G\bibinitperiod},
|
|
given={Glen},
|
|
giveni={G\bibinitperiod},
|
|
}}%
|
|
{{hash=IM}{%
|
|
family={Izzard},
|
|
familyi={I\bibinitperiod},
|
|
given={Martin},
|
|
giveni={M\bibinitperiod},
|
|
}}%
|
|
{{hash=MN}{%
|
|
family={McKeown},
|
|
familyi={M\bibinitperiod},
|
|
given={Nick},
|
|
giveni={N\bibinitperiod},
|
|
}}%
|
|
{{hash=RJ}{%
|
|
family={Rexford},
|
|
familyi={R\bibinitperiod},
|
|
given={Jennifer},
|
|
giveni={J\bibinitperiod},
|
|
}}%
|
|
{{hash=SC}{%
|
|
family={Schlesinger},
|
|
familyi={S\bibinitperiod},
|
|
given={Cole},
|
|
giveni={C\bibinitperiod},
|
|
}}%
|
|
{{hash=TD}{%
|
|
family={Talayco},
|
|
familyi={T\bibinitperiod},
|
|
given={Dan},
|
|
giveni={D\bibinitperiod},
|
|
}}%
|
|
{{hash=VA}{%
|
|
family={Vahdat},
|
|
familyi={V\bibinitperiod},
|
|
given={Amin},
|
|
giveni={A\bibinitperiod},
|
|
}}%
|
|
{{hash=VG}{%
|
|
family={Varghese},
|
|
familyi={V\bibinitperiod},
|
|
given={George},
|
|
giveni={G\bibinitperiod},
|
|
}}%
|
|
{{hash=WD}{%
|
|
family={Walker},
|
|
familyi={W\bibinitperiod},
|
|
given={David},
|
|
giveni={D\bibinitperiod},
|
|
}}%
|
|
}
|
|
\keyw{p4;protocol-independent;reconfigurability;sdn}
|
|
\strng{namehash}{BP+1}
|
|
\strng{fullhash}{BPDDGGIMMNRJSCTDVAVGWD1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2014}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{B}
|
|
\field{sortinithash}{B}
|
|
\field{abstract}{%
|
|
P4 is a high-level language for programming protocol-independent packet
|
|
processors. P4 works in conjunction with SDN control protocols like OpenFlow.
|
|
In its current form, OpenFlow explicitly specifies protocol headers on which
|
|
it operates. This set has grown from 12 to 41 fields in a few years,
|
|
increasing the complexity of the specification while still not providing the
|
|
flexibility to add new headers. In this paper we propose P4 as a strawman
|
|
proposal for how OpenFlow should evolve in the future. We have three goals:
|
|
(1) Reconfigurability in the field: Programmers should be able to change the
|
|
way switches process packets once they are deployed. (2) Protocol
|
|
independence: Switches should not be tied to any specific network protocols.
|
|
(3) Target independence: Programmers should be able to describe
|
|
packet-processing functionality independently of the specifics of the
|
|
underlying hardware. As an example, we describe how to use P4 to configure a
|
|
switch to add a new hierarchical label.%
|
|
}
|
|
\verb{doi}
|
|
\verb 10.1145/2656877.2656890
|
|
\endverb
|
|
\field{issn}{0146-4833}
|
|
\field{number}{3}
|
|
\field{pages}{87\bibrangedash 95}
|
|
\field{title}{P4: Programming Protocol-Independent Packet Processors}
|
|
\field{volume}{44}
|
|
\field{journaltitle}{SIGCOMM Comput. Commun. Rev.}
|
|
\field{year}{2014}
|
|
\endentry
|
|
|
|
\entry{BundesnetzagenturDeutschland.2021}{misc}{}
|
|
\name{author}{1}{}{%
|
|
{{hash=B}{%
|
|
family={{Bundesnetzagentur Deutschland}},
|
|
familyi={B\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{B1}
|
|
\strng{fullhash}{B1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2021}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{B}
|
|
\field{sortinithash}{B}
|
|
\field{title}{Jahresbericht 2020}
|
|
\verb{url}
|
|
\verb https://www.bundesnetzagentur.de/SharedDocs/Mediathek/Jahresberichte/
|
|
\verb JB2020.html
|
|
\endverb
|
|
\list{location}{1}{%
|
|
{n.p.}%
|
|
}
|
|
\field{year}{2021}
|
|
\field{urlday}{16}
|
|
\field{urlmonth}{05}
|
|
\field{urlyear}{2022}
|
|
\endentry
|
|
|
|
\entry{Callon.121990}{misc}{}
|
|
\name{author}{1}{}{%
|
|
{{hash=CR}{%
|
|
family={Callon},
|
|
familyi={C\bibinitperiod},
|
|
given={R.},
|
|
giveni={R\bibinitperiod},
|
|
}}%
|
|
}
|
|
\list{publisher}{1}{%
|
|
{{Internet Engineering Task Force IETF}}%
|
|
}
|
|
\strng{namehash}{CR1}
|
|
\strng{fullhash}{CR1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{12}
|
|
\field{labelendyear}{1990}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{C}
|
|
\field{sortinithash}{C}
|
|
\field{title}{OSI IS-IS for Routing in TCP/IP and Dual Environments}
|
|
\verb{url}
|
|
\verb https://datatracker.ietf.org/doc/html/rfc2328
|
|
\endverb
|
|
\list{institution}{1}{%
|
|
{{Digital Equipment Corporation}}%
|
|
}
|
|
\field{year}{12}
|
|
\field{endyear}{1990}
|
|
\field{urlday}{16}
|
|
\field{urlmonth}{05}
|
|
\field{urlyear}{2022}
|
|
\endentry
|
|
|
|
\entry{Chiesa.2021}{article}{}
|
|
\name{author}{5}{}{%
|
|
{{hash=CM}{%
|
|
family={Chiesa},
|
|
familyi={C\bibinitperiod},
|
|
given={Marco},
|
|
giveni={M\bibinitperiod},
|
|
}}%
|
|
{{hash=KA}{%
|
|
family={Kamisi{\'n}ski},
|
|
familyi={K\bibinitperiod},
|
|
given={Andrzej},
|
|
giveni={A\bibinitperiod},
|
|
}}%
|
|
{{hash=RJ}{%
|
|
family={Rak},
|
|
familyi={R\bibinitperiod},
|
|
given={Jacek},
|
|
giveni={J\bibinitperiod},
|
|
}}%
|
|
{{hash=RG}{%
|
|
family={R{\'e}tv{\'a}ri},
|
|
familyi={R\bibinitperiod},
|
|
given={G{\'a}bor},
|
|
giveni={G\bibinitperiod},
|
|
}}%
|
|
{{hash=SS}{%
|
|
family={Schmid},
|
|
familyi={S\bibinitperiod},
|
|
given={Stefan},
|
|
giveni={S\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{CM+1}
|
|
\strng{fullhash}{CMKARJRGSS1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2021}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{C}
|
|
\field{sortinithash}{C}
|
|
\verb{doi}
|
|
\verb 10.1109/COMST.2021.3063980
|
|
\endverb
|
|
\field{number}{2}
|
|
\field{pages}{1253\bibrangedash 1301}
|
|
\field{title}{A Survey of Fast-Recovery Mechanisms in Packet-Switched
|
|
Networks}
|
|
\field{volume}{23}
|
|
\field{journaltitle}{IEEE Communications Surveys Tutorials}
|
|
\field{year}{2021}
|
|
\endentry
|
|
|
|
\entry{Dridi.2016}{inproceedings}{}
|
|
\name{author}{2}{}{%
|
|
{{hash=DL}{%
|
|
family={Dridi},
|
|
familyi={D\bibinitperiod},
|
|
given={Lobna},
|
|
giveni={L\bibinitperiod},
|
|
}}%
|
|
{{hash=ZMF}{%
|
|
family={Zhani},
|
|
familyi={Z\bibinitperiod},
|
|
given={Mohamed\bibnamedelima Faten},
|
|
giveni={M\bibinitperiod\bibinitdelim F\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{DLZMF1}
|
|
\strng{fullhash}{DLZMF1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2016}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{D}
|
|
\field{sortinithash}{D}
|
|
\field{booktitle}{2016 5th IEEE International Conference on Cloud
|
|
Networking (Cloudnet)}
|
|
\verb{doi}
|
|
\verb 10.1109/CloudNet.2016.9
|
|
\endverb
|
|
\field{pages}{212\bibrangedash 217}
|
|
\field{title}{SDN-Guard: DoS Attacks Mitigation in SDN Networks}
|
|
\field{year}{2016}
|
|
\endentry
|
|
|
|
\entry{Dugan.2016}{misc}{}
|
|
\name{author}{5}{}{%
|
|
{{hash=DJ}{%
|
|
family={Dugan},
|
|
familyi={D\bibinitperiod},
|
|
given={Jon},
|
|
giveni={J\bibinitperiod},
|
|
}}%
|
|
{{hash=ES}{%
|
|
family={Elliott},
|
|
familyi={E\bibinitperiod},
|
|
given={Seth},
|
|
giveni={S\bibinitperiod},
|
|
}}%
|
|
{{hash=MBA}{%
|
|
family={Mah},
|
|
familyi={M\bibinitperiod},
|
|
given={Bruce\bibnamedelima A.},
|
|
giveni={B\bibinitperiod\bibinitdelim A\bibinitperiod},
|
|
}}%
|
|
{{hash=PJ}{%
|
|
family={Poskanzer},
|
|
familyi={P\bibinitperiod},
|
|
given={Jeff},
|
|
giveni={J\bibinitperiod},
|
|
}}%
|
|
{{hash=PK}{%
|
|
family={Prabhu},
|
|
familyi={P\bibinitperiod},
|
|
given={Kaustubh},
|
|
giveni={K\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{DJ+1}
|
|
\strng{fullhash}{DJESMBAPJPK1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2016}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{D}
|
|
\field{sortinithash}{D}
|
|
\field{title}{iperf3}
|
|
\verb{url}
|
|
\verb https://iperf.fr/
|
|
\endverb
|
|
\list{location}{1}{%
|
|
{n.p.}%
|
|
}
|
|
\field{year}{2016}
|
|
\field{urlday}{16}
|
|
\field{urlmonth}{05}
|
|
\field{urlyear}{2022}
|
|
\endentry
|
|
|
|
\entry{Gill.2011}{inproceedings}{}
|
|
\name{author}{3}{}{%
|
|
{{hash=GP}{%
|
|
family={Gill},
|
|
familyi={G\bibinitperiod},
|
|
given={Phillipa},
|
|
giveni={P\bibinitperiod},
|
|
}}%
|
|
{{hash=JN}{%
|
|
family={Jain},
|
|
familyi={J\bibinitperiod},
|
|
given={Navendu},
|
|
giveni={N\bibinitperiod},
|
|
}}%
|
|
{{hash=NN}{%
|
|
family={Nagappan},
|
|
familyi={N\bibinitperiod},
|
|
given={Nachiappan},
|
|
giveni={N\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{GPJNNN1}
|
|
\strng{fullhash}{GPJNNN1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2011}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{G}
|
|
\field{sortinithash}{G}
|
|
\field{booktitle}{Proceedings of the ACM SIGCOMM 2011 Conference}
|
|
\field{pages}{350\bibrangedash 361}
|
|
\field{title}{Understanding network failures in data centers: measurement,
|
|
analysis, and implications}
|
|
\field{year}{2011}
|
|
\endentry
|
|
|
|
\entry{Haque.2018}{inproceedings}{}
|
|
\name{author}{2}{}{%
|
|
{{hash=HI}{%
|
|
family={Haque},
|
|
familyi={H\bibinitperiod},
|
|
given={Israat},
|
|
giveni={I\bibinitperiod},
|
|
}}%
|
|
{{hash=MMA}{%
|
|
family={Moyeen},
|
|
familyi={M\bibinitperiod},
|
|
given={M.\bibnamedelima A.},
|
|
giveni={M\bibinitperiod\bibinitdelim A\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{HIMMA1}
|
|
\strng{fullhash}{HIMMA1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2018}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{H}
|
|
\field{sortinithash}{H}
|
|
\field{booktitle}{2018 14th International Conference on Network and Service
|
|
Management (CNSM)}
|
|
\field{pages}{268\bibrangedash 274}
|
|
\field{title}{Revive: A Reliable Software Defined Data Plane Failure
|
|
Recovery Scheme}
|
|
\field{year}{2018}
|
|
\endentry
|
|
|
|
\entry{InformationSciencesInstituteUniversityofSouthernCalifornia.1981}{misc}{}
|
|
\name{author}{1}{}{%
|
|
{{hash=I}{%
|
|
family={{Information Sciences Institute - University of Southern
|
|
California}},
|
|
familyi={I\bibinitperiod},
|
|
}}%
|
|
}
|
|
\list{publisher}{1}{%
|
|
{{RFC Editor}}%
|
|
}
|
|
\strng{namehash}{I1}
|
|
\strng{fullhash}{I1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{1981}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{I}
|
|
\field{sortinithash}{I}
|
|
\field{number}{793}
|
|
\field{title}{Transmission Control Protocol: RFC}
|
|
\verb{url}
|
|
\verb https://www.rfc-editor.org/rfc/rfc793
|
|
\endverb
|
|
\list{institution}{1}{%
|
|
{{RFC Editor}}%
|
|
}
|
|
\field{year}{1981}
|
|
\endentry
|
|
|
|
\entry{Jones.2015}{misc}{}
|
|
\name{author}{2}{}{%
|
|
{{hash=JR}{%
|
|
family={Jones},
|
|
familyi={J\bibinitperiod},
|
|
given={Rick},
|
|
giveni={R\bibinitperiod},
|
|
}}%
|
|
{{hash=C}{%
|
|
family={Contributors},
|
|
familyi={C\bibinitperiod},
|
|
}}%
|
|
}
|
|
\list{publisher}{1}{%
|
|
{{Hewlett Packard}}%
|
|
}
|
|
\strng{namehash}{JRC1}
|
|
\strng{fullhash}{JRC1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2015}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{J}
|
|
\field{sortinithash}{J}
|
|
\field{title}{netperf}
|
|
\verb{url}
|
|
\verb https://github.com/HewlettPackard/netperf
|
|
\endverb
|
|
\field{year}{2015}
|
|
\field{urlday}{11}
|
|
\field{urlmonth}{05}
|
|
\field{urlyear}{2022}
|
|
\endentry
|
|
|
|
\entry{Kuerban.2016}{inproceedings}{}
|
|
\name{author}{6}{}{%
|
|
{{hash=KM}{%
|
|
family={Kuerban},
|
|
familyi={K\bibinitperiod},
|
|
given={Mutalifu},
|
|
giveni={M\bibinitperiod},
|
|
}}%
|
|
{{hash=TY}{%
|
|
family={Tian},
|
|
familyi={T\bibinitperiod},
|
|
given={Yun},
|
|
giveni={Y\bibinitperiod},
|
|
}}%
|
|
{{hash=YQ}{%
|
|
family={Yang},
|
|
familyi={Y\bibinitperiod},
|
|
given={Qing},
|
|
giveni={Q\bibinitperiod},
|
|
}}%
|
|
{{hash=JY}{%
|
|
family={Jia},
|
|
familyi={J\bibinitperiod},
|
|
given={Yafei},
|
|
giveni={Y\bibinitperiod},
|
|
}}%
|
|
{{hash=HB}{%
|
|
family={Huebert},
|
|
familyi={H\bibinitperiod},
|
|
given={Brandon},
|
|
giveni={B\bibinitperiod},
|
|
}}%
|
|
{{hash=PD}{%
|
|
family={Poss},
|
|
familyi={P\bibinitperiod},
|
|
given={David},
|
|
giveni={D\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{KM+1}
|
|
\strng{fullhash}{KMTYYQJYHBPD1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2016}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{K}
|
|
\field{sortinithash}{K}
|
|
\field{booktitle}{2016 IEEE International Conference on Networking,
|
|
Architecture and Storage (NAS)}
|
|
\field{pages}{1\bibrangedash 2}
|
|
\field{title}{FlowSec: DOS attack mitigation strategy on SDN controller}
|
|
\field{year}{2016}
|
|
\endentry
|
|
|
|
\entry{Kvalbein.2005}{inproceedings}{}
|
|
\name{author}{5}{}{%
|
|
{{hash=KA}{%
|
|
family={Kvalbein},
|
|
familyi={K\bibinitperiod},
|
|
given={Amund},
|
|
giveni={A\bibinitperiod},
|
|
}}%
|
|
{{hash=HAF}{%
|
|
family={Hansen},
|
|
familyi={H\bibinitperiod},
|
|
given={Audun\bibnamedelima Fosselie},
|
|
giveni={A\bibinitperiod\bibinitdelim F\bibinitperiod},
|
|
}}%
|
|
{{hash=CT}{%
|
|
family={Cicic},
|
|
familyi={C\bibinitperiod},
|
|
given={Tarik},
|
|
giveni={T\bibinitperiod},
|
|
}}%
|
|
{{hash=GS}{%
|
|
family={Gjessing},
|
|
familyi={G\bibinitperiod},
|
|
given={Stein},
|
|
giveni={S\bibinitperiod},
|
|
}}%
|
|
{{hash=LO}{%
|
|
family={Lysne},
|
|
familyi={L\bibinitperiod},
|
|
given={Olav},
|
|
giveni={O\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{KA+1}
|
|
\strng{fullhash}{KAHAFCTGSLO1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2005}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{K}
|
|
\field{sortinithash}{K}
|
|
\field{booktitle}{10th IEEE Symposium on Computers and Communications
|
|
(ISCC'05)}
|
|
\field{pages}{554\bibrangedash 560}
|
|
\field{title}{Fast recovery from link failures using resilient routing
|
|
layers}
|
|
\field{year}{2005}
|
|
\endentry
|
|
|
|
\entry{LantzBobandtheMininetContributors.2021}{misc}{}
|
|
\name{author}{1}{}{%
|
|
{{hash=L}{%
|
|
family={{Lantz, Bob and the Mininet Contributors}},
|
|
familyi={L\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{L1}
|
|
\strng{fullhash}{L1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2021}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{L}
|
|
\field{sortinithash}{L}
|
|
\field{title}{Mininet}
|
|
\verb{url}
|
|
\verb http://mininet.org/
|
|
\endverb
|
|
\field{year}{2021}
|
|
\field{urlday}{10}
|
|
\field{urlmonth}{05}
|
|
\field{urlyear}{2022}
|
|
\endentry
|
|
|
|
\entry{Liu.2013}{inproceedings}{}
|
|
\name{author}{6}{}{%
|
|
{{hash=LJ}{%
|
|
family={Liu},
|
|
familyi={L\bibinitperiod},
|
|
given={Junda},
|
|
giveni={J\bibinitperiod},
|
|
}}%
|
|
{{hash=PA}{%
|
|
family={Panda},
|
|
familyi={P\bibinitperiod},
|
|
given={Aurojit},
|
|
giveni={A\bibinitperiod},
|
|
}}%
|
|
{{hash=SA}{%
|
|
family={Singla},
|
|
familyi={S\bibinitperiod},
|
|
given={Ankit},
|
|
giveni={A\bibinitperiod},
|
|
}}%
|
|
{{hash=GB}{%
|
|
family={Godfrey},
|
|
familyi={G\bibinitperiod},
|
|
given={Brighten},
|
|
giveni={B\bibinitperiod},
|
|
}}%
|
|
{{hash=SM}{%
|
|
family={Schapira},
|
|
familyi={S\bibinitperiod},
|
|
given={Michael},
|
|
giveni={M\bibinitperiod},
|
|
}}%
|
|
{{hash=SS}{%
|
|
family={Shenker},
|
|
familyi={S\bibinitperiod},
|
|
given={Scott},
|
|
giveni={S\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{LJ+1}
|
|
\strng{fullhash}{LJPASAGBSMSS1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2013}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{L}
|
|
\field{sortinithash}{L}
|
|
\field{booktitle}{10th USENIX Symposium on Networked Systems Design and
|
|
Implementation (NSDI 13)}
|
|
\field{pages}{113\bibrangedash 126}
|
|
\field{title}{Ensuring connectivity via data plane mechanisms}
|
|
\field{year}{2013}
|
|
\endentry
|
|
|
|
\entry{Maaen.052022}{thesis}{}
|
|
\name{author}{1}{}{%
|
|
{{hash=MF}{%
|
|
family={Maa{\ss}en},
|
|
familyi={M\bibinitperiod},
|
|
given={Frederik},
|
|
giveni={F\bibinitperiod},
|
|
}}%
|
|
}
|
|
\list{publisher}{1}{%
|
|
{Quantitative Techniques in Computer Science}%
|
|
}
|
|
\strng{namehash}{MF1}
|
|
\strng{fullhash}{MF1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{05/2022}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{M}
|
|
\field{sortinithash}{M}
|
|
\field{title}{Comparison of Fast Recovery Methods: Git Repository}
|
|
\verb{url}
|
|
\verb https://git.cs.tu-dortmund.de/frederik.maassen/ComparisonOfFastRecove
|
|
\verb ryMethodsInNetworks
|
|
\endverb
|
|
\list{location}{1}{%
|
|
{Dortmund}%
|
|
}
|
|
\list{institution}{1}{%
|
|
{{TU Dortmund}}%
|
|
}
|
|
\field{type}{Bachelor}
|
|
\field{year}{05/2022}
|
|
\field{urlday}{16}
|
|
\field{urlmonth}{05}
|
|
\field{urlyear}{2022}
|
|
\endentry
|
|
|
|
\entry{Montag.2015}{article}{}
|
|
\name{author}{8}{}{%
|
|
{{hash=MC}{%
|
|
family={Montag},
|
|
familyi={M\bibinitperiod},
|
|
given={Christian},
|
|
giveni={C\bibinitperiod},
|
|
}}%
|
|
{{hash=BK}{%
|
|
family={B{\l}aszkiewicz},
|
|
familyi={B\bibinitperiod},
|
|
given={Konrad},
|
|
giveni={K\bibinitperiod},
|
|
}}%
|
|
{{hash=SR}{%
|
|
family={Sariyska},
|
|
familyi={S\bibinitperiod},
|
|
given={Rayna},
|
|
giveni={R\bibinitperiod},
|
|
}}%
|
|
{{hash=LB}{%
|
|
family={Lachmann},
|
|
familyi={L\bibinitperiod},
|
|
given={Bernd},
|
|
giveni={B\bibinitperiod},
|
|
}}%
|
|
{{hash=AI}{%
|
|
family={Andone},
|
|
familyi={A\bibinitperiod},
|
|
given={Ionut},
|
|
giveni={I\bibinitperiod},
|
|
}}%
|
|
{{hash=TB}{%
|
|
family={Trendafilov},
|
|
familyi={T\bibinitperiod},
|
|
given={Boris},
|
|
giveni={B\bibinitperiod},
|
|
}}%
|
|
{{hash=EM}{%
|
|
family={Eibes},
|
|
familyi={E\bibinitperiod},
|
|
given={Mark},
|
|
giveni={M\bibinitperiod},
|
|
}}%
|
|
{{hash=MA}{%
|
|
family={Markowetz},
|
|
familyi={M\bibinitperiod},
|
|
given={Alexander},
|
|
giveni={A\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{MC+1}
|
|
\strng{fullhash}{MCBKSRLBAITBEMMA1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2015}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{M}
|
|
\field{sortinithash}{M}
|
|
\field{abstract}{%
|
|
Mounting evidence shows that smartphone usage heavily disrupts our work
|
|
life and social activities. Moreover, it is possible that overuse could
|
|
resemble addictive tendencies. A key contributing factor to smartphone
|
|
overuse seems to be usage of the messaging application WhatsApp. Although
|
|
WhatsApp is one of the most commonly used communication applications on
|
|
smartphones, research in this area is scarce. Given the huge societal debate
|
|
on the impact of smartphone usage on our daily lives, the present study
|
|
undertook a large-scale investigation in order to provide numbers on
|
|
smartphone usage generally---and use of WhatsApp in particular, with the aim
|
|
of providing a basis for a scientific debate.%
|
|
}
|
|
\verb{doi}
|
|
\verb 10.1186/s13104-015-1280-z
|
|
\endverb
|
|
\field{issn}{1756-0500}
|
|
\field{number}{1}
|
|
\field{pages}{331}
|
|
\field{title}{Smartphone usage in the 21st century: who is active on
|
|
WhatsApp?}
|
|
\field{volume}{8}
|
|
\field{journaltitle}{BMC Research Notes}
|
|
\field{year}{2015}
|
|
\endentry
|
|
|
|
\entry{Moy.041998}{misc}{}
|
|
\true{moreauthor}
|
|
\true{morelabelname}
|
|
\name{author}{1}{}{%
|
|
{{hash=MJ}{%
|
|
family={Moy},
|
|
familyi={M\bibinitperiod},
|
|
given={John},
|
|
giveni={J\bibinitperiod},
|
|
}}%
|
|
}
|
|
\list{publisher}{1}{%
|
|
{{Internet Engineering Task Force IETF}}%
|
|
}
|
|
\strng{namehash}{MJ+1}
|
|
\strng{fullhash}{MJ+1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{04}
|
|
\field{labelendyear}{1998}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{M}
|
|
\field{sortinithash}{M}
|
|
\field{title}{OSPF version 2}
|
|
\verb{url}
|
|
\verb https://datatracker.ietf.org/doc/html/rfc2328
|
|
\endverb
|
|
\field{year}{04}
|
|
\field{endyear}{1998}
|
|
\field{urlday}{15}
|
|
\field{urlmonth}{03}
|
|
\field{urlyear}{2022}
|
|
\endentry
|
|
|
|
\entry{Muelas.2018}{article}{}
|
|
\name{author}{3}{}{%
|
|
{{hash=MD}{%
|
|
family={Muelas},
|
|
familyi={M\bibinitperiod},
|
|
given={David},
|
|
giveni={D\bibinitperiod},
|
|
}}%
|
|
{{hash=RJ}{%
|
|
family={Ramos},
|
|
familyi={R\bibinitperiod},
|
|
given={Javier},
|
|
giveni={J\bibinitperiod},
|
|
}}%
|
|
{{hash=dVJEL}{%
|
|
prefix={de},
|
|
prefixi={d\bibinitperiod},
|
|
family={Vergara},
|
|
familyi={V\bibinitperiod},
|
|
given={Jorge E.\bibnamedelima Lopez},
|
|
giveni={J\bibinitperiod\bibinitdelim E\bibinitperiod\bibinitdelim
|
|
L\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{MDRJVJELd1}
|
|
\strng{fullhash}{MDRJVJELd1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2018}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{M}
|
|
\field{sortinithash}{M}
|
|
\verb{doi}
|
|
\verb 10.1109/MNET.2018.1700277
|
|
\endverb
|
|
\field{number}{6}
|
|
\field{pages}{168\bibrangedash 176}
|
|
\field{title}{Assessing the Limits of Mininet-Based Environments for
|
|
Network Experimentation}
|
|
\field{volume}{32}
|
|
\field{journaltitle}{IEEE Network}
|
|
\field{year}{2018}
|
|
\endentry
|
|
|
|
\entry{Nelakuditi.2003}{inproceedings}{}
|
|
\name{author}{4}{}{%
|
|
{{hash=NS}{%
|
|
family={Nelakuditi},
|
|
familyi={N\bibinitperiod},
|
|
given={Srihari},
|
|
giveni={S\bibinitperiod},
|
|
}}%
|
|
{{hash=LS}{%
|
|
family={Lee},
|
|
familyi={L\bibinitperiod},
|
|
given={Sanghwan},
|
|
giveni={S\bibinitperiod},
|
|
}}%
|
|
{{hash=YY}{%
|
|
family={Yu},
|
|
familyi={Y\bibinitperiod},
|
|
given={Yinzhe},
|
|
giveni={Y\bibinitperiod},
|
|
}}%
|
|
{{hash=ZZL}{%
|
|
family={Zhang},
|
|
familyi={Z\bibinitperiod},
|
|
given={Zhi-Li},
|
|
giveni={Z\bibinithyphendelim L\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{NS+1}
|
|
\strng{fullhash}{NSLSYYZZL1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2003}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{N}
|
|
\field{sortinithash}{N}
|
|
\field{booktitle}{International Workshop on Quality of Service}
|
|
\field{pages}{287\bibrangedash 304}
|
|
\field{title}{Failure insensitive routing for ensuring service
|
|
availability}
|
|
\field{year}{2003}
|
|
\endentry
|
|
|
|
\entry{Oracle.2022}{misc}{}
|
|
\name{author}{1}{}{%
|
|
{{hash=O}{%
|
|
family={Oracle},
|
|
familyi={O\bibinitperiod},
|
|
}}%
|
|
}
|
|
\list{publisher}{1}{%
|
|
{Oracle}%
|
|
}
|
|
\strng{namehash}{O1}
|
|
\strng{fullhash}{O1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2022}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{O}
|
|
\field{sortinithash}{O}
|
|
\field{title}{VirtualBox}
|
|
\verb{url}
|
|
\verb https://www.virtualbox.org/
|
|
\endverb
|
|
\field{year}{2022}
|
|
\field{urlday}{11}
|
|
\field{urlmonth}{05}
|
|
\field{urlyear}{2022}
|
|
\endentry
|
|
|
|
\entry{Rak.2020}{book}{}
|
|
\name{editor}{2}{}{%
|
|
{{hash=RJ}{%
|
|
family={Rak},
|
|
familyi={R\bibinitperiod},
|
|
given={Jacek},
|
|
giveni={J\bibinitperiod},
|
|
}}%
|
|
{{hash=HD}{%
|
|
family={Hutchison},
|
|
familyi={H\bibinitperiod},
|
|
given={David},
|
|
giveni={D\bibinitperiod},
|
|
}}%
|
|
}
|
|
\list{publisher}{1}{%
|
|
{{Springer Nature}}%
|
|
}
|
|
\strng{namehash}{RJHD1}
|
|
\strng{fullhash}{RJHD1}
|
|
\field{labelnamesource}{editor}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2020}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{R}
|
|
\field{sortinithash}{R}
|
|
\field{isbn}{978-3-030-44687-1}
|
|
\field{title}{Guide to disaster-resilient communication networks}
|
|
\field{year}{2020}
|
|
\endentry
|
|
|
|
\entry{Shukla.2021}{inproceedings}{}
|
|
\name{author}{2}{}{%
|
|
{{hash=SA}{%
|
|
family={Shukla},
|
|
familyi={S\bibinitperiod},
|
|
given={Apoorv},
|
|
giveni={A\bibinitperiod},
|
|
}}%
|
|
{{hash=FKT}{%
|
|
family={Foerster},
|
|
familyi={F\bibinitperiod},
|
|
given={Klaus-Tycho},
|
|
giveni={K\bibinithyphendelim T\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{SAFKT1}
|
|
\strng{fullhash}{SAFKT1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2021}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{S}
|
|
\field{sortinithash}{S}
|
|
\field{booktitle}{Proceedings of the Symposium on Architectures for
|
|
Networking and Communications Systems}
|
|
\field{pages}{15\bibrangedash 22}
|
|
\field{title}{Shortcutting Fast Failover Routes in the Data Plane}
|
|
\field{year}{2021}
|
|
\endentry
|
|
|
|
\entry{ThomasHolterbach.2019}{inproceedings}{}
|
|
\name{author}{6}{}{%
|
|
{{hash=T}{%
|
|
family={{Thomas Holterbach}},
|
|
familyi={T\bibinitperiod},
|
|
}}%
|
|
{{hash=E}{%
|
|
family={{Edgar Costa Molero}},
|
|
familyi={E\bibinitperiod},
|
|
}}%
|
|
{{hash=M}{%
|
|
family={{Maria Apostolaki}},
|
|
familyi={M\bibinitperiod},
|
|
}}%
|
|
{{hash=A}{%
|
|
family={{Alberto Dainotti}},
|
|
familyi={A\bibinitperiod},
|
|
}}%
|
|
{{hash=S}{%
|
|
family={{Stefano Vissicchio}},
|
|
familyi={S\bibinitperiod},
|
|
}}%
|
|
{{hash=L}{%
|
|
family={{Laurent Vanbever}},
|
|
familyi={L\bibinitperiod},
|
|
}}%
|
|
}
|
|
\list{publisher}{1}{%
|
|
{{USENIX Association}}%
|
|
}
|
|
\strng{namehash}{T+1}
|
|
\strng{fullhash}{TEMASL1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2019}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{T}
|
|
\field{sortinithash}{T}
|
|
\field{booktitle}{16th USENIX Symposium on Networked Systems Design and
|
|
Implementation (NSDI 19)}
|
|
\field{isbn}{978-1-931971-49-2}
|
|
\field{pages}{161\bibrangedash 176}
|
|
\field{title}{Blink: Fast Connectivity Recovery Entirely in the Data Plane}
|
|
\verb{url}
|
|
\verb https://www.usenix.org/conference/nsdi19/presentation/holterbach
|
|
\endverb
|
|
\list{location}{1}{%
|
|
{Boston, MA}%
|
|
}
|
|
\field{year}{2019}
|
|
\endentry
|
|
|
|
\entry{vanRossum.2009}{book}{}
|
|
\name{author}{2}{}{%
|
|
{{hash=vG}{%
|
|
family={{van Rossum}},
|
|
familyi={v\bibinitperiod},
|
|
given={Guido},
|
|
giveni={G\bibinitperiod},
|
|
}}%
|
|
{{hash=DFL}{%
|
|
family={Drake},
|
|
familyi={D\bibinitperiod},
|
|
given={Fred\bibnamedelima L.},
|
|
giveni={F\bibinitperiod\bibinitdelim L\bibinitperiod},
|
|
}}%
|
|
}
|
|
\list{publisher}{1}{%
|
|
{CreateSpace}%
|
|
}
|
|
\strng{namehash}{vGDFL1}
|
|
\strng{fullhash}{vGDFL1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2009}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{V}
|
|
\field{sortinithash}{V}
|
|
\field{isbn}{1441412697}
|
|
\field{title}{Python 3 Reference Manual}
|
|
\list{location}{1}{%
|
|
{Scotts Valley, CA}%
|
|
}
|
|
\field{year}{2009}
|
|
\endentry
|
|
|
|
\entry{Wustenhoff.2002}{article}{}
|
|
\name{author}{2}{}{%
|
|
{{hash=WE}{%
|
|
family={Wustenhoff},
|
|
familyi={W\bibinitperiod},
|
|
given={Edward},
|
|
giveni={E\bibinitperiod},
|
|
}}%
|
|
{{hash=BS}{%
|
|
family={BluePrints},
|
|
familyi={B\bibinitperiod},
|
|
given={Sun},
|
|
giveni={S\bibinitperiod},
|
|
}}%
|
|
}
|
|
\strng{namehash}{WEBS1}
|
|
\strng{fullhash}{WEBS1}
|
|
\field{labelnamesource}{author}
|
|
\field{labeltitlesource}{title}
|
|
\field{labelyear}{2002}
|
|
\field{labeldatesource}{}
|
|
\field{sortinit}{W}
|
|
\field{sortinithash}{W}
|
|
\field{title}{Service level agreement in the data center}
|
|
\field{volume}{2}
|
|
\field{journaltitle}{Sun Microsystems Professional Series}
|
|
\field{year}{2002}
|
|
\endentry
|
|
\enddatalist
|
|
\endinput
|
|
|