References
- Han, B., Gopalakrishnan, V., Ji, L., & Lee, S., "Network function virtualization: Challenges and opportunities for innovations," IEEE Communications Magazine, 53(2), 90- 97, 2015. https://doi.org/10.1109/MCOM.2015.7045396
- Ahamed Aljuhani, Talal Alharbi, "Virtualized Network Functions security attacks and vulnerabilities," in Proc. of Computing and Communication Workshop and Conference, January, 2017.
- Sang Il Kim, Hwa Sung Kim, "A high available service based on virtualization technology in NFV," in Proc. of International Conference on Information Networking, pp. 649-652, January, 2017.
- Faqir Zarrar Yousaf , Michael Bredel, Sibylle Schaller, Fabian Schneider, "NFV and SDN - Key Technology Enablers for 5G Networks," IEEE Journal on Selected Areas in Communications, Issue 99, October 6, 2017.
- Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xiaoming Fu, "Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security," in Proc. of IEEE International Conference on Computer Communications, April, 2006.
- A. H. Harbitter, D. A. Menasce, "Performance of public-key-enabled Kerberos authentication in large networks," in Proc. of IEEE Symposium on Security and Privacy, May, 2000.
- Eman El-Emam, Magdy Koutb, Hamdy Kelash, Osama Farag Allah, "An optimized Kerberos authentication protocol," in Proc. of International Conference on Computer Engineering & Systems, pp.508-513, December, 2009.
- M. Naor, M. Yung, "Universal one-way hash functions and their cryptographic applications," in Proc. of the twenty-first annual ACM symposium on Theory of computing, pp.33-43, January, 1989.
- Min-Qing Zhang, Bin Dong, Xiao-Yuan Yang, "A New Self-Updating Hash Chain Structure Scheme," Computational Intelligence and Security, pp.315-318, December, 2009.
- Yuta Kurihara, Masakazu Soshi, "A novel hash chain construction for simple and efficient authentication," in Proc. of Annual Conference on Privacy, Security and Trust, pp.539-542, December , 2016.
- Xiangyang Jiang, Jie Ling, "Simple and effective one-time password authentication scheme," in Proc. of International Symposium on Instrumentation and Measurement, Sensor Network and Automation, pp.529-531, December, 2013.
- Huiyi Liu, Yuegong Zhang, "An improved one-time password authentication scheme," in Proc. of IEEE International Conference on Communication Technology, November 17-19, 2016.
- Saket Acharya, Namita Tiwari, "Survey of DDoS Attacks Based On TCP/IP Protocol Vulnerabilities," IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 18, Issue 3, pp. 68-76, 2016.
- Wentao Liu, "Research on DoS Attack and Detection Programming," in Proc. of International Symposium on Intelligent Information Technology Application(IITA), pp.207-201, November 21-22, 2009.
- SteveMansfield-Devine, "The growth and evolution of DDoS," Network Security, vol. 2015, Issue 10, pp.13-20, October, 2015. https://doi.org/10.1016/S1353-4858(15)30092-1
- Neha Gupta, Ankur Jain, Pranav Saini, Vaibhav Gupta, "DDoS attack algorithm using ICMP flood," Computing for Sustainable Global Develop, pp.4082-4084, March, 2016.
- Wei Chen, Dit-Yan Yeung, "Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing," in Proc. of Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, April, 2006.
- Resul Das, Abubakar Karabade, Gurkan Tuna, "Common network attack types and defense mechanisms," in Proc. of Signal Processing and Communications Applications Conference (SIU), 2015.
- Mahmood Khalel Ibrahem, "Modification of Diffie-Hellman Key Exchange Algorithm for Zero Knowledge Proof," in Proc. of International Conference on Future Communication Networks, pp.147-152, April, 2012.