{NetComplete}: Practical {Network-Wide} configuration synthesis with autocompletion

A El-Hassany, P Tsankov, L Vanbever… - 15th USENIX Symposium …, 2018 - usenix.org
Network operators often need to adapt the configuration of a network in order to comply with
changing routing policies. Evolving existing configurations, however, is a complex task as …

Removing the reliance on perimeters for security using network views

I Anjum, D Kostecki, E Leba, J Sokal… - Proceedings of the 27th …, 2022 - dl.acm.org
Traditional enterprise security relies on network perimeters to define and enforce network
security policies. Emerging application-focused Zero Trust architectures attempt to address …

MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy

I Anjum, J Sokal, HR Rehman, B Weintraub… - Proceedings of the 28th …, 2023 - dl.acm.org
Commercially-available software defined networking (SDN) technologies will play an
important role in protecting the on-premises resources that remain as enterprises transition …

QoS policies to improve performance in Academic Campus and SDN Networks

RG Barba, M Criollo, N Aimacaña… - 2018 IEEE 10th Latin …, 2018 - ieeexplore.ieee.org
Given the evolution of technology and the growing demand for resources from users of
campus networks that affect network performance, a solution based on SDN is proposed; a …

Memory-efficient membership encoding in switches

M Pan, R MacDavid, S Landau-Feibish… - Proceedings of the …, 2020 - dl.acm.org
Network applications often define policies to manage network traffic based on its attributes
(eg, a service chain, valid next-hops, permission flags). These policies match against …

CLAP: Compact labeling scheme for attribute-based IoT policy control

M Kodialam, F Hao, S Mukherjee - 2019 15th International …, 2019 - ieeexplore.ieee.org
In order to create services using IoT devices, the underlying network infrastructure must
support large number of such devices with different underlying protocols, and diverse …

Políticas públicas en el Ecuador hacia la ciberseguridad en base a QoS en redes de campus académicos en entornos convencionales y SDN

R Barba-Vera, MC Bustamante… - Revista Ibérica de …, 2020 - search.proquest.com
Ante la era de la Sociedad de la Información y del Conocimiento, Ecuador está aplicando
políticas gubernamentales enfocadas a cumplir con este compromiso. Los servicios e …

Systems and methods for encoding and decoding IoT messages

M Uddin, M Kodialam, F Hao, S Mukherjee - US Patent 10,826,828, 2020 - Google Patents
US10826828B2 - Systems and methods for encoding and decoding IoT messages - Google
Patents US10826828B2 - Systems and methods for encoding and decoding IoT messages …

Towards reliable network control planes

A Elhassany - 2019 - research-collection.ethz.ch
Many critical services, such as e-commerce, emergency response, or even remote
surgeries, rely on computer networks. This strategic importance makes them a mission …

Monitoring and identifying bottlenecks in virtual network functions service chains

RJ Pfitscher - 2019 - lume.ufrgs.br
Network functions perform an important role in the communication between clients and
endservices in computer networks. These functions, traditionally provided by hardware …