
@article{p4,
 author = {Bosshart, Pat and Daly, Dan and Gibb, Glen and Izzard, Martin and McKeown, Nick and Rexford, Jennifer and Schlesinger, Cole and Talayco, Dan and Vahdat, Amin and Varghese, George and Walker, David},
 title = {P4: Programming Protocol-independent Packet Processors},
 journal = {SIGCOMM Comput. Commun. Rev.},
 issue_date = {July 2014},
 volume = {44},
 number = {3},
 month = jul,
 year = {2014},
 issn = {0146-4833},
 pages = {87--95},
 numpages = {9},
 acmid = {2656890},
 publisher = {ACM},
 address = {New York, NY, USA},
} 

@inproceedings{magneto,
 author = {Jin, Cheng and Lumezanu, Cristian and Xu, Qiang and Mekky, Hesham and Zhang, Zhi-Li and Jiang, Guofei},
 title = {Magneto: Unified Fine-grained Path Control in Legacy and OpenFlow Hybrid Networks},
 series = {SOSR '17},
 year = {2017},
 isbn = {978-1-4503-4947-5},
 location = {Santa Clara, CA, USA},
 pages = {75--87},
 numpages = {13},
 url = {http://doi.acm.org/10.1145/3050220.3050229},
 doi = {10.1145/3050220.3050229},
 acmid = {3050229},
 publisher = {ACM}
} 

@inproceedings {panopticon,
author = {Dan Levin and Marco Canini and Stefan Schmid and Fabian Schaffert and Anja Feldmann},
title = {{Panopticon: Reaping the Benefits of Incremental {SDN} Deployment in Enterprise Networks}},
booktitle = {{ATC} 14},
year = {2014},
pages = {333--345},
month = {Jun}
}

@inproceedings{0trust,
author = {Doug Barth and Evan Gilman},
title = {Zero Trust Networks: Building Trusted Systems in Untrusted Networks},
booktitle = {{LISA} 2017},
year = {2017},
publisher = {{USENIX} Association},
month = {Mar}
}

@inproceedings {0trust_1,
author = {Bryan Zimmer},
title = {{LISA}: A Practical Zero Trust Architecture},
booktitle = {Enigma 2018 (Enigma 2018)},
year = {2018},
publisher = {{USENIX} Association},
month = {Jan}
}

@inproceedings{HeterNet,
 author = {Zhang, Yongguang and Vin, Harrick and Alvisi, Lorenzo and Lee, Wenke and Dao, Son K.},
 title = {Heterogeneous Networking: A New Survivability Paradigm},
 booktitle = {Proceedings of the 2001 Workshop on New Security Paradigms},
 series = {NSPW '01},
 year = {2001},
 isbn = {1-58113-457-6},
 location = {Cloudcroft, New Mexico},
 pages = {33--39},
 numpages = {7},
 publisher = {ACM},
 address = {Cloudcroft, New Mexico, USA}
} 

@inproceedings{buffer,
  title={Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks.},
  author={Cowan, Crispan and Pu, Calton and Maier, Dave and Walpole, Jonathan and Bakke, Peat and Beattie, Steve and Grier, Aaron and Wagle, Perry and Zhang, Qian and Hinton, Heather},
  booktitle={USENIX Security Symposium},
  volume={98},
  pages={63--78},
  year={1998},
  organization={San Antonio, TX}
}

@article{ddos,
 author = {Mirkovic, Jelena and Reiher, Peter},
 title = {A Taxonomy of DDoS Attack and DDoS Defense Mechanisms},
 journal = {SIGCOMM Comput. Commun. Rev.},
 issue_date = {April 2004},
 volume = {34},
 number = {2},
 month = apr,
 year = {2004},
 issn = {0146-4833},
 pages = {39--53},
 numpages = {15},
 publisher = {ACM},
 address = {New York, NY, USA}
}

@ARTICLE{leakage, 
author={ {Feng Zhu} and M. W. {Mutka} and L. M. {Ni}}, 
journal={IEEE Transactions on Mobile Computing}, 
title={A private, secure, and user-centric information exposure model for service discovery protocols}, 
year={2006}, 
volume={5}, 
number={4}, 
pages={418-429}, 
month={April}
}

@inproceedings{0day,
 author = {Bilge, Leyla and Dumitra\c{s}, Tudor},
 title = {Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World},
 booktitle = {Proceedings of the 2012 ACM Conference on Computer and Communications Security},
 series = {CCS '12},
 year = {2012},
 isbn = {978-1-4503-1651-4},
 location = {Raleigh, North Carolina, USA},
 pages = {833--844},
 numpages = {12},
 publisher = {ACM},
 address = {Raleigh, North Carolina, USA}
}

@ARTICLE{sdnsurvey, 
author={D. {Kreutz} and F. M. V. {Ramos} and P. E. {Veríssimo} and C. E. {Rothenberg} and S. {Azodolmolky} and S. {Uhlig}}, 
journal={Proceedings of the IEEE}, 
title={Software-Defined Networking: A Comprehensive Survey}, 
year={2015}, 
volume={103}, 
number={1}, 
pages={14-76}, 
month={Jan}
}

@inproceedings{b4,
 author = {Jain, Sushant and Kumar, Alok and Mandal, Subhasree and Ong, Joon and Poutievski, Leon and Singh, Arjun and Venkata, Subbaiah and Wanderer, Jim and Zhou, Junlan and Zhu, Min and Zolla, Jon and H\"{o}lzle, Urs and Stuart, Stephen and Vahdat, Amin},
 title = {B4: Experience with a Globally-deployed Software Defined Wan},
 booktitle = {Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM},
 series = {SIGCOMM '13},
 year = {2013},
 isbn = {978-1-4503-2056-6},
 location = {Hong Kong, China},
 pages = {3--14},
 numpages = {12},
 acmid = {2486019},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {centralized traffic engineering, openflow, routing, software- defined networking, wide-area networks},
}

@inproceedings{fboss,
 author = {Choi, Sean and Burkov, Boris and Eckert, Alex and Fang, Tian and Kazemkhani, Saman and Sherwood, Rob and Zhang, Ying and Zeng, Hongyi},
 title = {FBOSS: Building Switch Software at Scale},
 booktitle = {Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication},
 series = {SIGCOMM '18},
 year = {2018},
 isbn = {978-1-4503-5567-4},
 location = {Budapest, Hungary},
 pages = {342--356},
 numpages = {15},
 acmid = {3230546},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {FBOSS, Facebook, data center networks, network management, network monitoring, switch software design},
} 

@article{sdn_dp_security,
  title={Software-defined network {SDN} data plane security: Issues, solutions and future directions},
  author={Shaghaghi, Arash and Kaafar, Mohamed Ali and Buyya, Rajkumar and Jha, Sanjay},
  journal={arXiv preprint arXiv:1804.00262},
  year={2018}
}

@ARTICLE{sdn_data_plane_security, 
author={T. {Dargahi} and A. {Caponi} and M. {Ambrosin} and G. {Bianchi} and M. {Conti}}, 
journal={IEEE Communications Surveys Tutorials}, 
title={A Survey on the Security of Stateful SDN Data Planes}, 
year={2017}, 
volume={19}, 
number={3}, 
pages={1701-1725}, 
month={{Third Quarter}}
}

@ARTICLE{joint, 
author={Z. {Guo} and W. {Chen} and Y. {Liu} and Y. {Xu} and Z. {Zhang}}, 
journal={IEEE Journal on Selected Areas in Communications}, 
title={Joint Switch Upgrade and Controller Deployment in Hybrid Software-Defined Networks}, 
year={2019}, 
volume={37}, 
number={5}, 
pages={1012-1028},
month={May}
}

@article{faucet,
 author = {Bailey, Josh and Stuart, Stephen},
 title = {Faucet: Deploying SDN in the Enterprise},
 journal = {Queue},
 issue_date = {September-October 2016},
 volume = {14},
 number = {5},
 month = oct,
 year = {2016},
 issn = {1542-7730},
 pages = {30:54--30:68},
 articleno = {30},
 numpages = {15},
 acmid = {3015763},
 publisher = {ACM},
 address = {New York, NY, USA},
} 

@INPROCEEDINGS{icnupgrade, 
author={X. {Jia} and Y. {Jiang} and Z. {Guo}}, 
booktitle={2016 IEEE 41st Conference on Local Computer Networks (LCN)}, 
title={Incremental Switch Deployment for Hybrid Software-Defined Networks}, 
year={2016}, 
volume={}, 
number={}, 
pages={571-574},  
month={Nov}
}

@inproceedings{sosrupgrade,
 author = {Hong, David Ke and Ma, Yadi and Banerjee, Sujata and Mao, Z. Morley},
 title = {Incremental Deployment of SDN in Hybrid Enterprise and ISP Networks},
 booktitle = {Proceedings of the Symposium on SDN Research},
 series = {SOSR '16},
 year = {2016},
 isbn = {978-1-4503-4211-7},
 location = {Santa Clara, CA, USA},
 pages = {1:1--1:7},
 articleno = {1},
 numpages = {7},
 publisher = {ACM},
 address = {Santa Clara, CA, USA},
 keywords = {Software-Defined Networks, incremental deployment},
}

@inproceedings{packetvaccine,
  author    = {XiaoFeng Wang and
               Zhuowei Li and
               Jun Xu and
               Michael K. Reiter and
               Chongkyung Kil and
               Jong Youl Choi},
  title     = {Packet vaccine: black-box exploit detection and signature generation},
  booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications
               Security, {CCS} 2006, Alexandria, VA, USA, Ioctober 30 - November
               3, 2006},
  pages     = {37--46},
  year      = {2006}
}

@ARTICLE{sdnservey, 
author={D. {Kreutz} and F. M. V. {Ramos} and P. E. {Veríssimo} and C. E. {Rothenberg} and S. {Azodolmolky} and S. {Uhlig}}, 
journal={Proceedings of the IEEE}, 
title={Software-Defined Networking: A Comprehensive Survey}, 
year={2015}, 
volume={103}, 
number={1}, 
pages={14-76}, 
month={Jan}
}

@ARTICLE{dosiin, 
author={G. {Carl} and G. {Kesidis} and R. R. {Brooks} and {Suresh Rai}}, 
journal={IEEE Internet Computing}, 
title={Denial-of-service attack-detection techniques}, 
year={2006}, 
volume={10}, 
number={1}, 
pages={82-89}, 
month={Jan}
}

@article{dostcs,
 author = {Moore, David and Shannon, Colleen and Brown, Douglas J. and Voelker, Geoffrey M. and Savage, Stefan},
 title = {Inferring Internet Denial-of-service Activity},
 journal = {ACM Trans. Comput. Syst.},
 issue_date = {May 2006},
 volume = {24},
 number = {2},
 month = may,
 year = {2006},
 issn = {0734-2071},
 pages = {115--139},
 numpages = {25},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {Backscatter, denial-of-service, network measurement, network security},
} 

@inproceedings{overflow,
 author = {Hsu, Fu-Hau and Guo, Fanglu and Chiueh, Tzi-cker},
 title = {Scalable Network-based Buffer Overflow Attack Detection},
 booktitle = {Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems},
 series = {ANCS '06},
 year = {2006},
 isbn = {1-59593-580-0},
 location = {San Jose, California, USA},
 pages = {163--172},
 numpages = {10},
 publisher = {ACM},
 address = {San Jose, California, USA},
 keywords = {CTCP, buffer overflow attacks, generalized attack signatures, network-based intrusion detection, payload bypassing, return-into-libc attacks},
} 

@book{graphcoloring,
  title={Graph coloring problems},
  author={Jensen, Tommy R and Toft, Bjarne},
  volume={39},
  year={2011},
  publisher={John Wiley \& Sons}
}

@incollection{nphard,
  title={Exact algorithms for NP-hard problems: A survey},
  author={Woeginger, Gerhard J},
  booktitle={Combinatorial optimization—eureka, you shrink!},
  pages={185--207},
  year={2003},
  publisher={Springer}
}



@article{switch_price,
  title={{Router-Switch.com}, leading network hardware supplier.},
  journal={\url{https://www.router-switch.com}},
  note={Accessed: 2019-08-20}
}

@inproceedings{retroflow,
 author    = {Zehua Guo and
               Wendi Feng and
               Sen Liu and
               Wenchao Jiang and
               Yang Xu and
               Zhi{-}Li Zhang},
  title     = {RetroFlow: maintaining control resiliency and flow programmability
               for software-defined WANs},
  booktitle = {Proceedings of the International Symposium on Quality of Service,
               IWQoS 2019, Phoenix, AZ, USA, June 24-25, 2019.},
  pages     = {1:1--1:10},
  year      = {2019}
}

@ARTICLE{topozoo, 
author={Knight, Simon and Nguyen, Hung X and Falkner, Nickolas and Bowden, Rhys and Roughan, Matthew}, 
journal={IEEE Journal on Selected Areas in Communications (JSAC)}, 
title={The Internet Topology Zoo}, 
year={2011}, 
volume={29}, 
number={9}, 
pages={1765-1775}, 
month={October}
}

@article{igraph,
  title={The igraph software package for complex network research},
  author={Csardi, Gabor and Nepusz, Tamas and others},
  journal={InterJournal, Complex Systems},
  volume={1695},
  number={5},
  pages={1--9},
  year={2006}
}

@article{gurobi,
  title={Gurobi Optimizer},
  author={{Gurobi}},
  journal={Gurobi: http://www.gurobi.com},
  year={2019}
}

@article{brocade,
  title={{Brocade MLX-8 PE}},
  author={{Brocade}},
  journal={\url{https://www.dataswitchworks.com/datasheets/
MLX Series DS.pdf}},
  year={2019}
}

@article{att,
  title={{First in the U.S. to Mobile 5G – What’s Next? Defining AT\&T’s Network Path in 2019 and Beyond}},
  author={{AT\&T}},
  journal={\url{https://about.att.com/story/2019/2019_and_beyond.html}},
  year={2019}
}