Demo: The Design and Implementation of Intelligent Software Defined Security Framework
Abstract
References
Index Terms
- Demo: The Design and Implementation of Intelligent Software Defined Security Framework
Recommendations
A testbed for intelligent software defined security framework
ACM TURC '19: Proceedings of the ACM Turing Celebration Conference - ChinaIn this paper, we propose an IntelligentSDS testbed, which is based on a novel Software Defined Security (SDS) framework powered with Artificial Intelligence. In particular, IntelligentSDS aims to flexibly deploy multiple security agents to white-box ...
Security of Software Defined Networks
Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper ...
A Review on C3I Systems’ Security: Vulnerabilities, Attacks, and Countermeasures
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in critical civil and military domains for achieving information superiority, operational efficacy, and greater situational awareness. The critical civil and military ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Sharad Agarwal,
- Ben Greenstein,
- Aruna Balasubramanian,
- Program Chairs:
- Shyam Gollakota,
- Xinyu Zhang
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Demonstration
Funding Sources
- Zhejiang Key Research and Development Plan
- National Natural Science Foundation of China
- the Fundamental Research Funds for the Central Universities
- National Key R&D Program of China
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 159Total Downloads
- Downloads (Last 12 months)5
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in