Summary – 1

Naik,P.G Kamath, R.S. Patil, M.B , Jun 2017 Client Virtualization using VMware for Manageable Learning Envirnoment at CSIBER, International Journal of Advanced Research in Computer Science Vol. 8 Issue 5, p 890-895, http://web.b.ebscohost.com/ehost/detail/detail?vid=7&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=124636467&db=aci

 

Abdelazia, Ahmed, 2016 Survey on Network Virtualization Using OpenFlow: Taxonomy, Opportunities, and Open Issues. Vol. 10 Issue 10, p4902-4932 http://web.b.ebscohost.com/ehost/detail/detail?vid=12&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=aci&AN=119398804

 

You Lu, Bao-Chuan Fu,2017 The Closer the Better: A Filtering Model for Malicious Traffic in SDN Network Domain.Journal of Residuals Science & Tehnology Vol 14 Issue 3 p471-481 http://web.b.ebscohost.com/ehost/detail/detail?vid=14&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=122877590&db=aci

 

Chen, Qingxia 2017, An Integrated Framework for Software Defined Networking, Caching, and Computing, IEEE Network, Vol 31 p46-55 http://web.b.ebscohost.com/ehost/detail/detail?vid=16&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=123392069&db=aci

 

Yang, Hwan-Seok 2015, A study on attack information collection using virtualization technology, Multimedia Tools & Applications, Vol 74 p8791-8799 http://web.b.ebscohost.com/ehost/detail/detail?vid=18&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=109466507&db=aci

Leave a Reply