References
- Cisco Visual Networking Index: Forecst and Methodology, 2015-2020, white paper
- A. M. K. Pathan and B. Rajkumar, "A taxonomy and survey of content delivery networks," Grid Comput. Distrib. Syst. Lab., Univ. Melbourne, Parkville, Vic, Australia, Tech. Rep., 2007.
- E. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, "A survey and comparison of peer-to-peer overlay network schemes," IEEE Commun. Surveys Tuts., vol. 7, no. 2, pp. 72-93, 2005. https://doi.org/10.1109/COMST.2005.1610546
- S. Arianfar, T. Koponen, B. Raghavan, and S. Shenker, "On preserving privacy in content-oriented networks," in Proc. ACM SIGCOMM Workshop CN, Aug. 2011, pp. 19-24.
- M. Ion, J. Zhang, M. Schuchard, and E. M. Schooler, "Toward contentcentric privacy in ICN: Attribute-based encryption and routing," in Proc. ASIA CCS, Hangzhou, China, Aug. 2013, pp. 513-514.
- G. Tyson, N. Sastry, I. Rimac, R. Cuevas, and A. Mauthe, "A survey of mobility in information-centric networks: Challenges and research directions," in Proc. NoM, New York, NY, USA, Jun. 2012, pp. 1-6.
- P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, "DoS & DDoS in named data networking," in Proc 22nd Int. Conf. Comput. Commun. Netw., 2013,pp.1-7.
- A. Compagno, M. Conti, P. Gasti, and G. Tsudik, "Poseidon: Mitigating interest flooding DDoS attacks in named data networking," in Proc. IEEE 38th Conf. Local Comput. Netw., Oct. 2013, pp. 630-638.
- N. Fotiou, G. F. Giannis, and G. C. Polyzos, "Access control enforcement delegation for information-centric networking architectures," in Proc. 2nd Edition ICN Workshop Inf.-Centric Netw., Aug. 2012, pp. 85-90.
- N. Fotiou, G. F. Marias, and G. C. Polyzos, "Fighting spam in publish /subscribe networks using information ranking," in Proc. 6thEURO-NF Conf. NGI, Paris, France, Jun. 2010, pp.1-6.
- M. Xie, I.Widjaja, andH.Wang, "Enhancing cache robustness for contentcentric networking," in Proc. IEEE INFOCOM, 2012, pp. 2426-2434.
- A. Mohaisen, X. Zhang, M. Schuchard, H. Xie, and Y. Kim, "Protecting access privacy of cached contents in information centric networks," in Proc. SIGCOMM, Hong Kong, China, May 2013, pp. 1001-1003.
- C. Ghali, G. Tsudik, and E. Uzun, "Needle in a haystack: Mitigating content poisoning in named-data networking," in Proc. SENT, San Diego, CA, USA, 2014, pp. 1-10.
- B. Vieira and E. Poll, "A security protocol for information-centric net- working in smart grids," in Proc. SEGS, Berlin, Germany, Nov. 2013, pp. 1-10.
- A. Barua, H. Shahriar, and M. Zulkernine, "Server-side detection of content sniffing attacks," in Proc. 22nd Annu. ISSRE, Hiroshima, Japan, Nov. 2011, pp. 20-29.
- H. Shahriar and M. Zulkernine, "Client-side detection of cross-site request forgery attacks," in Proc. 21st IEEE ISSRE, San Jose, CA, USA, Nov. 2010, pp. 358-367.
- E. AfAllah, H.Hassanein and M.Zulkernine."A Survey of Security Attacks in Information-Centric Networking", in IEEE Comm. Survey & Tutorials, Jan. 2015, pp 1441-1454