M. Moreno-ambrosin, F. D. Conti, R. Gaspari, and . Poovendran, LineSwitch, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pp.639-644, 2015.
DOI : 10.1145/2508859.2516684

E. Cambiaso, G. Papaleo, and M. Aiello, SlowDroid: Turning a Smartphone into a Mobile Attack Vector, 2014 International Conference on Future Internet of Things and Cloud, pp.405-410, 2014.
DOI : 10.1109/FiCloud.2014.72

E. Cambiaso, G. Papaleo, G. Chiola, and M. Aiello, Slow DoS attacks: definition and categorisation, International Journal of Trust Management in Computing and Communications, vol.1, issue.3/4, pp.300-319, 2013.
DOI : 10.1504/IJTMCC.2013.056440

E. Cambiaso, G. Papaleo, G. Chiola, and M. Aiello, Designing and Modeling the Slow Next DoS Attack, CISIS and ICEUTE, 2015.
DOI : 10.1007/978-3-319-19713-5_22

E. Cambiaso, G. Papaleo, G. Chiola, and M. Aiello, Mobile executions of Slow DoS attacks, Logic Journal of IGPL, 2015.
DOI : 10.1093/jigpal/jzv043

R. Andrew, W. Curtis, P. Kim, and . Yalagandula, Mahout: Low-overhead datacenter traffic management using end-host-based elephant detection, In INFO- COM, pp.1629-1637, 2011.

Y. Gil-dantas, O. O. Marcilio, I. Lemos, V. Fonseca, and . Nigam, Formal Specification and Verification of a Selective Defense for TDoS Attacks, WRLA, 2016.
DOI : 10.1016/j.entcs.2009.02.069

Y. Gil-dantas, V. Nigam, and I. E. Fonseca, A Selective Defense for Application Layer DDoS Attacks, 2014 IEEE Joint Intelligence and Security Informatics Conference, pp.75-82, 2014.
DOI : 10.1109/JISIC.2014.21

M. Dhawan, R. Poddar, K. Mahajan, and V. Mann, SPHINX: Detecting Security Attacks in Software-Defined Networks, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23064

X. Dong, H. Lin, R. Tan, K. Ravishankar, Z. Iyer et al., Software-Defined Networking for Smart Grid Resilience, Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, CPSS '15, 2015.
DOI : 10.1007/978-3-319-11212-1_27

S. Hong, L. Xu, H. Wang, and G. Gu, Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23283

URL : http://faculty.cs.tamu.edu/guofei/paper/TopoGuard_NDSS15.pdf

R. Kandoi and M. Antikainen, Denial-of-service attacks in OpenFlow SDN networks, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015.
DOI : 10.1109/INM.2015.7140489

K. Kannan and S. Banerjee, Compact TCAM: Flow Entry Compaction in TCAM for Power Aware SDN
DOI : 10.1007/978-3-642-35668-1_32

N. Katta, O. Alipourfard, J. Rexford, and D. Walker, Infinite CacheFlow in software-defined networks, Proceedings of the third workshop on Hot topics in software defined networking, HotSDN '14, pp.175-180, 2014.
DOI : 10.1145/2620728.2620734

S. Khanna, S. S. Venkatesh, O. Fatemieh, F. Khan, and C. A. Gunter, Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks, IEEE/ACM Transactions on Networking, vol.20, issue.3, pp.715-728, 2012.
DOI : 10.1109/TNET.2011.2171057

URL : http://seclab.illinois.edu/wp-content/uploads/2012/07/KhannaVFKG12.pdf

R. Klöti, V. Kotronis, and P. Smith, OpenFlow: A security analysis, 2013 21st IEEE International Conference on Network Protocols (ICNP)
DOI : 10.1109/ICNP.2013.6733671

O. O. Marcilio, Y. G. Lemos, I. Dantas, V. Fonseca, G. Nigam et al., A Selective Defense for Mitigating Coordinated Call Attacks, SBRC, 2016.

O. O. Marcílio, Y. G. Lemos, I. E. Dantas, V. Fonseca, and . Nigam, On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks

. Openflow, Open Networking Foundation

J. Shen, Defending against Flow Table Overloading Attack in, Software-Defined Networks IEEE Transactions on Services Computing

S. Shin and G. Gu, Attacking software-defined networks, Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, HotSDN '13, pp.165-166, 2013.
DOI : 10.1145/2491185.2491220

S. Shin, V. Yegneswaran, P. Porras, and G. Gu, AVANT-GUARD, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13
DOI : 10.1145/2508859.2516684

A. Vishnoi, R. Poddar, V. Mann, and S. Bhattacharya, Effective switch memory management in OpenFlow networks, Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, DEBS '14, 2014.
DOI : 10.1145/2611286.2611301

H. Wang, L. Xu, and G. Gu, FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp.239-250, 2015.
DOI : 10.1109/DSN.2015.27

M. Wang, H. Zhou, J. Chen, and B. Tong, An Approach for Protecting the OpenFlow Switch from the Saturation Attack, Proceedings of the 2015 4th National Conference on Electrical, Electronics and Computer Engineering, 2016.
DOI : 10.2991/nceece-15.2016.135

M. Yu, J. Rexford, J. Michael, J. Freedman, and . Wang, Scalable flowbased networking with difane, ACM Computer Communication Review, 2010.
DOI : 10.1145/1851182.1851224

A. Zarek, Y. Ganjali, and D. Lie, Openflow timeouts demystified, 2012.