A comprehensive survey on SDN security: threats, mitigations, and future directions

Y Maleh, Y Qasmaoui, K El Gholami, Y Sadqi… - Journal of Reliable …, 2023 - Springer
Nowadays, security threats on Software Defined Network SDN architectures are similar to
traditional networks. However, the profile of these threats changes with SDN. For example, a …

[PDF][PDF] The DAO: a million dollar lesson in blockchain governance

F Santos, V Kostakis - School of Business and Governance …, 2018 - digikogu.taltech.ee
Blockchain is an underexplored research topic with increasing societal relevance. The
majority of available literature deals with technical aspects, overlooking topics like …

New kids on the block: an analysis of modern blockchains

L Anderson, R Holz, A Ponomarev, P Rimba… - arXiv preprint arXiv …, 2016 - arxiv.org
Half a decade after Bitcoin became the first widely used cryptocurrency, blockchains are
receiving considerable interest from industry and the research community. Modern …

Exploring sybil and double-spending risks in blockchain systems

M Iqbal, R Matulevičius - IEEE Access, 2021 - ieeexplore.ieee.org
The first step to realise the true potential of blockchain systems is to explain the associated
security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat …

Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems

K Yan, J Zhang, X Liu, W Diao, S Guo - Proceedings of the ACM Web …, 2023 - dl.acm.org
The blockchain-powered decentralized applications and systems have been widely
deployed in recent years. The decentralization feature promises users anonymity, security …

SDN security review: Threat taxonomy, implications, and open challenges

M Rahouti, K Xiong, Y Xin… - IEEE …, 2022 - ieeexplore.ieee.org
Software-Defined networking (SDN) is a networking paradigm to enable dynamic, flexible,
and programmatically efficient configuration of networks to revolutionize network control and …

Understanding the role of registrars in DNSSEC deployment

T Chung, R van Rijswijk-Deij, D Choffnes… - Proceedings of the …, 2017 - dl.acm.org
The Domain Name System (DNS) provides a scalable, flexible name resolution service.
Unfortunately, its unauthenticated architecture has become the basis for many security …

DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour

K Žiža, P Tadić, P Vuletić - International Journal of Information Security, 2023 - Springer
Abstract The Domain Name System (DNS) exfiltration is an activity in which an infected
device sends data to the attacker's server by encoding it in DNS request messages …

[图书][B] Decentralised Internet of Things: A blockchain perspective

MA Khan, MT Quasim, F Algarni, A Alharthi - 2020 - books.google.com
This book presents practical as well as conceptual insights into the latest trends, tools,
techniques and methodologies of blockchains for the Internet of Things. The decentralised …

Defending internet of things against malicious domain names using D-FENS

J Spaulding, A Mohaisen - 2018 IEEE/ACM symposium on …, 2018 - ieeexplore.ieee.org
Malicious domain names have long been pervasive in the global DNS (Domain Name
System) infrastructure and lend themselves to undesirable activities such as phishing or …