Monitoring network neutrality: A survey on traffic differentiation detection

T Garrett, LE Setenareski, LM Peres… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Network neutrality is becoming increasingly important as the global debate intensifies and
governments worldwide implement and withdraw regulations. According to this principle, all …

Network services anomalies in NFV: Survey, taxonomy, and verification methods

M Zoure, T Ahmed, L Réveillère - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Network Function Virtualization (NFV) has emerged as a disruptive networking architecture
whose galloping evolution is prompting enterprises to outsource network functions to the …

[PDF][PDF] A position paper on data sovereignty: The importance of geolocating data in the cloud

ZNJ Peterson, M Gondree, R Beverly - … Workshop on Hot Topics in Cloud …, 2011 - usenix.org
In this paper we define the problem and scope of data sovereignty–the coupling of stored
data authenticity and geographical location in the cloud. Establishing sovereignty is an …

Geolocation of data in the cloud

M Gondree, ZNJ Peterson - Proceedings of the third ACM conference on …, 2013 - dl.acm.org
We introduce and analyze a general framework for authentically binding data to a location
while providing strong assurances against cloud storage providers that (either accidentally …

SLA-verifier: Stateful and quantitative verification for service chaining

Y Zhang, W Wu, S Banerjee, JM Kang… - IEEE INFOCOM 2017 …, 2017 - ieeexplore.ieee.org
Network verification has been recently proposed to detect network misconfigurations.
Existing work focuses on the reachability. This paper proposes a framework that verifies the …

Multiplicative update methods for incremental quantile estimation

A Yazidi, H Hammer - IEEE transactions on cybernetics, 2017 - ieeexplore.ieee.org
We present a novel lightweight incremental quantile estimator which possesses far less
complexity than the Tierney's estimator and its extensions. Notably, our algorithm relies only …

On game-theoretic network security provisioning

S Rass - Journal of network and systems management, 2013 - Springer
Abstract Service level agreements occasionally come as qualitative claims rather than
quantitative statements. Motivated by the well-known fact that different (security) service …

Characterizing the availability and latency in aws network from the perspective of tenants

H Iqbal, A Singh, M Shahzad - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
Scalability and performance requirements are driving tenants to increasingly move their
applications to public clouds. Unfortunately, cloud providers do not provide a view of their …

Reassessing the constancy of end-to-end internet latency

L Davisson, J Jakovleski, N Ngo, C Pham… - IFIP Network Traffic …, 2021 - par.nsf.gov
A paper by Zhang et al. in 2001,“On the Constancy of Internet Path Properties”[1] examined
the constancy of end-to-end packet loss, latency, and throughput using a modest set of hosts …

Using Tuangou to reduce IP transit costs

I Castro, R Stanojevic, S Gorinsky - IEEE/ACM Transactions on …, 2013 - ieeexplore.ieee.org
A majority of Internet service providers (ISPs) support connectivity to the entire Internet by
transiting their traffic via other providers. Although the transit prices per megabit per second …