References
- N. Chowdhury and R. Boutaba, "A survey of network virtualization," Computer Networks (Elsevier), Vol. 54, No. 5, pp.862-876, 2010. https://doi.org/10.1016/j.comnet.2009.10.017
- N. M. Mosharaf Kabir Chowdhury and R. Boutaba, "Network virtualization: State of the art and research challenges," IEEE Comm. Magazine, Vol. 47, No. 7, pp. 20-26, 2009.
- M. M. Alam Khan, N. Shahriar, R. Ahmed and R. Boutaba, "Multi-Path Link Embedding for Survivability in Virtual Networks," IIEEE Trans. on Network and Service Management, Vol. 13, No. 2, pp.253-266, 2016. https://doi.org/10.1109/TNSM.2016.2558598
- A. Blenk, A. Basta, M. Reisslein, W. Kellerer, "Survey on Network Virtualization Hypervisors for Software Defined Networking," IEEE Comm. Surveys & Tutorials, Vol. 18, No. 1, pp.655-685, 2016. https://doi.org/10.1109/COMST.2015.2489183
- Jung-Yul Choi, "A Study on Networking Technology for Cloud Data Centers," Journal of Digital Convergence, Vol. 14, No. 2, pp.235-243, 2016. https://doi.org/10.14400/JDC.2016.14.2.235
- Jeong-Kyung Moon, Han Jin Cho, Jin-Mook Kim, "A secure authentication system on wired wireless integrated network using OpenFlow," Journal of Digital Convergence, Vol. 12, No. 4, pp.285-291, 2014. https://doi.org/10.14400/JDC.2014.12.4.285
- Cheul-Woo Ro, "Modeling of Virtual Switch in Cloud System," Journal of Digital Convergence, Vol. 11, No. 12, pp.479-485, 2013. https://doi.org/10.14400/JDPM.2013.11.12.479
- Y. Zhu and M. Ammar, "Algorithms for Assigning Substrate Network Resources to Virtual Network Components," IEEE INFOCOM 2006, pp.1-12, 2006.
- Andreas Fischer, Juan Felipe Botero, Michael Till Beck, Hermann de Meer, Xavier Hesselbach, "Virtual Network Embedding: A Survey," IEEE Comm. Surveys & Tutorials, Vol. 15, No. 4, pp.1888-1906, 2013. https://doi.org/10.1109/SURV.2013.013013.00155
- Seung-Joon Seok, Hyeonuk Jeong, "A Study on OpenFlow based Virtual Network Platform for KREONET," Journal of Digital Convergence, Vol. 12, No. 8, pp.309-319, 2014. https://doi.org/10.14400/JDC.2014.12.8.309
- Jin-Woo Jung, Jungduk Kim, Myeong-Gyun Song, Chul-Gu Jin, "A study on Development of Certification Schemes for Cloud Security," Journal of Digital Convergence, Vol. 13, No. 8, pp.43-49, 2015. https://doi.org/10.14400/JDC.2015.13.8.43
- Bo-Kyung Lee, "A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services", Journal of the Korea Convergence Society, Vol. 5, No. 4, pp. 93-99, 2014. https://doi.org/10.15207/JKCS.2014.5.4.093
- Keun-Ho Lee, "Analysis of Threats Factor in IT Convergence Security", Journal of the Korea Convergence Society, Vol. 1, No. 1, pp. 49-55, 2010.
- Yongho Kang, Changbok Jang, Wanjik Lee, Seokyeol Heo, Jooman Kim, "Efficient Method to Support Mobile Virtualization-based Cloud Resource Management," Journal of Digital Convergence, Vol. 12, No. 2, pp.277-283, 2014. https://doi.org/10.14400/JDC.2014.12.2.277
- I. Houidi, W. Louati, D. Zeghlache, and S. Baucke, "Virtual Resource Description and Clustering for Virtual Network Discovery," in Proc. IEEE ICC'09 Workshops, Dresden, Germany, pp.1-6, 2009.
- A. Belbekkouche, Md. M. Hasan and A. Karmouch, "Resource Discovery and Allocation in Network Virtualization," IEEE Comm. Surveys & Tutorials, Vol. 14, No. 4, pp.1114-1128, 2012. https://doi.org/10.1109/SURV.2011.122811.00060
- I. Houidi, W. Louati, and D. Zeghlache, "A distributed virtual network mapping algorithm," 2008 IEEE ICC, Beijing, China, pp.5634-5640, 2008.
- A. Haider, R. Potter and A. Nakao, "Challenges in Resource Allocation in Network Virtualization," 20th ITC Specialist Seminar, Vol. 20, pp.22-30, 2009.
- Minlan Yu, Yung Yi, Jennifer Rexford and Mung Chiang, "Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration," ACM SIGCOMM CCR, Vol. 38, Issue 2, pp.17-29, 2008.
- Yu Yang, Shan-zhi Chen, Xin Li and Yan Wang, "RMap: An Algorithm of Virtual Network Resilience Mapping," WiCOM2011, pp.1-4, 2011.
- Xiaohui Wei, Shoufeng Hu, Hongliang Li, Fan Yang and Yue Jin, "A Survey on Virtual Network Embedding in Cloud Computing Centers," The Open Automation and Control Systems Journal, Vol. 6, No. 1, pp.414-425, 2014. https://doi.org/10.2174/1874444301406010414
- Haotong Cao, Longxiang Yang, Zeyuan Liu, Mengting Wu, "Exact solutions of VNE: A survey," China Communications, Vol. 13, No. 6, pp.48-62, 2016. https://doi.org/10.1109/CC.2016.7513202
- Hwi-Min Choi, Chang-Bok Jang, Joo-Man Kim, "Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM," Journal of Digital Convergence, Vol. 12, No. 10, pp.299-308, 2014.