• Zhao Z, Liu Z, Chen H, Zhang F, Song Z and Li Z. Effective DDoS Mitigation via ML-Driven In-Network Traffic Shaping. IEEE Transactions on Dependable and Secure Computing. 10.1109/TDSC.2023.3349180. 21:4. (4271-4289).

    https://ieeexplore.ieee.org/document/10380450/

  • Saharan S and Gupta V. (2024). Prevention of DDoS attacks: a comprehensive review and future directions. Information Security Journal: A Global Perspective. 10.1080/19393555.2024.2347243. (1-33).

    https://www.tandfonline.com/doi/full/10.1080/19393555.2024.2347243

  • Jiang W, Wang Y and Ye S. (2024). A Memorable Communication Method Based on Cryptographic Accumulator. Electronics. 10.3390/electronics13061081. 13:6. (1081).

    https://www.mdpi.com/2079-9292/13/6/1081

  • Bao H, Zhao Y, Zhang X, Wang G, Duan J, Tian R, Men J and Zhang M. A Probabilistic and Distributed Validation Framework Based on Blockchain for Artificial Intelligence of Things. IEEE Internet of Things Journal. 10.1109/JIOT.2023.3279849. 11:1. (17-28).

    https://ieeexplore.ieee.org/document/10136375/

  • Zhao Z, Li Z, Zhou Z, Yu J, Song Z, Xie X, Zhang F and Zhang R. (2023). DDoS Family: A Novel Perspective for Massive Types of DDoS Attacks. Computers & Security. 10.1016/j.cose.2023.103663. (103663). Online publication date: 1-Dec-2023.

    https://linkinghub.elsevier.com/retrieve/pii/S0167404823005734

  • Cheng Y, Gao S and Hou X. (2022). A Secure Authentication Mechanism for Multi-Dimensional Identifier Network 2022 International Conference on Networking and Network Applications (NaNA). 10.1109/NaNA56854.2022.00035. 978-1-6654-6131-3. (163-168).

    https://ieeexplore.ieee.org/document/9985116/

  • Luo H, Liu Z and Zhang S. Preventing DDoS Flooding Attacks With Cryptographic Path Identifiers in Future Internet. IEEE Transactions on Network and Service Management. 10.1109/TNSM.2022.3147511. 19:2. (1690-1704).

    https://ieeexplore.ieee.org/document/9697074/

  • Saharan S and Gupta V. (2022). Prevention of DrDoS Amplification Attacks by Penalizing the Attackers in SDN Environment. Advanced Information Networking and Applications. 10.1007/978-3-030-99587-4_58. (684-696).

    https://link.springer.com/10.1007/978-3-030-99587-4_58

  • Pradhan D, Sahu P, Ghonge M, Rajeswari and Tun H. (2022). Security Approaches to SDN-Based Ad hoc Wireless Network Toward 5G Communication. Software Defined Networking for Ad Hoc Networks. 10.1007/978-3-030-91149-2_7. (141-156).

    https://link.springer.com/10.1007/978-3-030-91149-2_7

  • Que J, Li H, Bai H, Lin L, Liew S and Wuttisittikulkij L. (2021). A Network Architecture Containing Both Push and Pull Semantics 2021 7th International Conference on Computer and Communications (ICCC). 10.1109/ICCC54389.2021.9674325. 978-1-6654-0950-6. (2211-2216).

    https://ieeexplore.ieee.org/document/9674325/

  • Balakrishnan H, Banerjee S, Cidon I, Culler D, Estrin D, Katz-Bassett E, Krishnamurthy A, McCauley M, McKeown N, Panda A, Ratnasamy S, Rexford J, Schapira M, Shenker S, Stoica I, Tennenhouse D, Vahdat A and Zegura E. (2021). Revitalizing the public internet by making it extensible. ACM SIGCOMM Computer Communication Review. 51:2. (18-24). Online publication date: 11-Apr-2021.

    https://doi.org/10.1145/3464994.3464998

  • He L, Ren G, Liu Y and Yang J. PAVI: Bootstrapping Accountability and Privacy to IPv6 Internet. IEEE/ACM Transactions on Networking. 10.1109/TNET.2020.3047667. 29:2. (695-708).

    https://ieeexplore.ieee.org/document/9325068/

  • Xia Y, Su J, Chen R and Huang X. APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer. IEEE Transactions on Information Forensics and Security. 10.1109/TIFS.2020.3032294. 16. (1245-1260).

    https://ieeexplore.ieee.org/document/9229460/

  • Xie L, Zhao S, Zhang X, Shi Y, Xiao X and Zheng Z. (2021). Fine-Grained Intra-domain Bandwidth Allocation Against DDoS Attack. Security and Privacy in Communication Networks. 10.1007/978-3-030-90019-9_20. (399-417).

    https://link.springer.com/10.1007/978-3-030-90019-9_20

  • Cui H and Yuen T. (2020). Address-Based Signature 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 10.1109/TrustCom50675.2020.00119. 978-1-6654-0392-4. (884-891).

    https://ieeexplore.ieee.org/document/9343182/

  • Yuan B, Zhao H, Lin C, Zou D, Yang L, Jin H, He L and Yu S. Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management. IEEE Transactions on Network Science and Engineering. 10.1109/TNSE.2020.2981449. 7:4. (2541-2554).

    https://ieeexplore.ieee.org/document/9039680/

  • Faisal T, Di Francesco Maesa D, Sastry N and Mangiante S. AJIT. Proceedings of the ACM MobiArch 2020 The 15th Workshop on Mobility in the Evolving Internet Architecture. (48-53).

    https://doi.org/10.1145/3411043.3412506

  • Tran M, Choi I, Moon G, Vu A and Kang M. (2020). A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network 2020 IEEE Symposium on Security and Privacy (SP). 10.1109/SP40000.2020.00027. 978-1-7281-3497-0. (894-909).

    https://ieeexplore.ieee.org/document/9152616/

  • Pappas C, Lee T, Reischuk R, Szalachowski P and Perrig A. (2019). Network Transparency for Better Internet Security. IEEE/ACM Transactions on Networking. 27:5. (2028-2042). Online publication date: 1-Oct-2019.

    https://doi.org/10.1109/TNET.2019.2937132

  • McCauley J, Harchol Y, Panda A, Raghavan B and Shenker S. Enabling a permanent revolution in internet architecture. Proceedings of the ACM Special Interest Group on Data Communication. (1-14).

    https://doi.org/10.1145/3341302.3342075

  • Wang J, Xu C, Wang X, Li W, Li Z, Jiang S and Steenkiste P. (2019). SoftStage: Content Staging for Vehicular Content Delivery in the eXpressive Internet Architecture 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). 10.1109/ICDCS.2019.00093. 978-1-7281-2519-0. (891-900).

    https://ieeexplore.ieee.org/document/8885117/

  • Liu Z, Cao Y, Zhu M and Ge W. Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services. IEEE Transactions on Information Forensics and Security. 10.1109/TIFS.2018.2870828. 14:4. (1098-1108).

    https://ieeexplore.ieee.org/document/8466917/

  • He L, Ren G and Liugg Y. (2019). Bootstrapping Accountability and Privacy to IPv6 Internet without Starting from Scratch IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. 10.1109/INFOCOM.2019.8737453. 978-1-7281-0515-4. (1486-1494).

    https://ieeexplore.ieee.org/document/8737453/

  • Zave P and Rexford J. (2019). The compositional architecture of the internet. Communications of the ACM. 62:3. (78-87). Online publication date: 21-Feb-2019.

    https://doi.org/10.1145/3226588

  • De Almeida M, De Sousa Júnior R, García Villalba L and Kim T. (2018). New DoS Defense Method Based on Strong Designated Verifier Signatures. Sensors. 10.3390/s18092813. 18:9. (2813).

    https://www.mdpi.com/1424-8220/18/9/2813

  • Ma Y, Wu Y, Ge J and Li J. (2018). A Flow-Level Architecture for Balancing Accountability and Privacy 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). 10.1109/TrustCom/BigDataSE.2018.00138. 978-1-5386-4388-4. (984-989).

    https://ieeexplore.ieee.org/document/8456007/

  • Luo H, Chen Z, Li J and Vasilakos T. On the Benefits of Keeping Path Identifiers Secret in Future Internet: A DDoS Perspective. IEEE Transactions on Network and Service Management. 10.1109/TNSM.2018.2800007. 15:2. (650-664).

    https://ieeexplore.ieee.org/document/8277154/

  • Dogar F. (2018). Towards Slack-Aware Networking. ACM SIGCOMM Computer Communication Review. 48:2. (24-30). Online publication date: 1-May-2018.

    https://doi.org/10.1145/3213232.3213236

  • Cao Y, Gao Y, Tan R, Han Q and Liu Z. Understanding Internet DDoS Mitigation from Academic and Industrial Perspectives. IEEE Access. 10.1109/ACCESS.2018.2877710. 6. (66641-66648).

    https://ieeexplore.ieee.org/document/8528307/

  • Ma Y, Wu Y, Ge J and Li J. An Architecture for Accountable Anonymous Access in the Internet-of-Things Network. IEEE Access. 10.1109/ACCESS.2018.2806483. 6. (14451-14461).

    https://ieeexplore.ieee.org/document/8292863/

  • Wu H, Hsiao H, Asoni D, Scherrer S, Perrig A and Hu Y. (2018). CLEF: Limiting the Damage Caused by Large Flows in the Internet Core. Cryptology and Network Security. 10.1007/978-3-030-00434-7_5. (89-108).

    http://link.springer.com/10.1007/978-3-030-00434-7_5

  • Ma Y, Wu Y, Ge J and Li J. (2017). A New Architecture for Anonymous Use of Services in Distributed Computing Networks 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC). 10.1109/ISPA/IUCC.2017.00059. 978-1-5386-3790-6. (368-374).

    https://ieeexplore.ieee.org/document/8367289/

  • Lichtblau F, Streibelt F, Krüger T, Richter P and Feldmann A. Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses. Proceedings of the 2017 Internet Measurement Conference. (86-99).

    https://doi.org/10.1145/3131365.3131367

  • Yu Y, Belazzougui D, Qian C and Zhang Q. (2017). A concise forwarding information base for scalable and fast name lookups 2017 IEEE 25th International Conference on Network Protocols (ICNP). 10.1109/ICNP.2017.8117530. 978-1-5090-6501-1. (1-10).

    http://ieeexplore.ieee.org/document/8117530/

  • Zhao F, Zhao B and Yuan Y. (2017). ABN: Attribute based networking for enterprise networks 2017 IEEE 17th International Conference on Communication Technology (ICCT). 10.1109/ICCT.2017.8359671. 978-1-5090-3944-9. (405-411).

    https://ieeexplore.ieee.org/document/8359671/

  • Awais M and Shah M. (2017). Information-centric networking: A review on futuristic networks 2017 23rd International Conference on Automation and Computing (ICAC). 10.23919/IConAC.2017.8082033. 978-0-7017-0260-1. (1-5).

    http://ieeexplore.ieee.org/document/8082033/

  • Xiao Z, Xiao Y and Wu J. (2017). P-Accountability. Wireless Personal Communications: An International Journal. 95:4. (3785-3812). Online publication date: 1-Aug-2017.

    https://doi.org/10.1007/s11277-017-4026-5

  • Kantola R, Kabir H and Loiseau P. (2017). Cooperation and end‐to‐end in the Internet. International Journal of Communication Systems. 10.1002/dac.3268. 30:12. Online publication date: 1-Aug-2017.

    https://onlinelibrary.wiley.com/doi/10.1002/dac.3268

  • Hu G, Chen W, Li Q, Jiang Y and Xu K. (2017). TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code. Future Generation Computer Systems. 10.1016/j.future.2016.09.005. 72. (219-226). Online publication date: 1-Jul-2017.

    https://linkinghub.elsevier.com/retrieve/pii/S0167739X16303004

  • Liu X, Zhao M, Li S, Zhang F and Trappe W. (2017). A Security Framework for the Internet of Things in the Future Internet Architecture. Future Internet. 10.3390/fi9030027. 9:3. (27).

    http://www.mdpi.com/1999-5903/9/3/27

  • Barrera D, Chuat L, Perrig A, Reischuk R and Szalachowski P. (2017). The SCION internet architecture. Communications of the ACM. 60:6. (56-65). Online publication date: 24-May-2017.

    https://doi.org/10.1145/3085591

  • Kalim U, Gardner M, Brown E and Feng W. SLIM. Proceedings of the Symposium on Architectures for Networking and Communications Systems. (165-177).

    https://doi.org/10.1109/ANCS.2017.30

  • Chen A, Haeberlen A, Zhou W and Loo B. One Primitive to Diagnose Them All. Proceedings of the Twelfth European Conference on Computer Systems. (374-388).

    https://doi.org/10.1145/3064176.3064212

  • Scott W. A Secure, Practical & Safe Packet Spoofing Service. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. (926-928).

    https://doi.org/10.1145/3052973.3055155

  • Lee T, Pappas C, Perrig A, Gligor V and Hu Y. The Case for In-Network Replay Suppression. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. (862-873).

    https://doi.org/10.1145/3052973.3052988

  • Matsumoto S, Reischuk R, Szalachowski P, Kim T and Perrig A. (2017). Authentication Challenges in a Global Environment. ACM Transactions on Privacy and Security. 20:1. (1-34). Online publication date: 28-Feb-2017.

    https://doi.org/10.1145/3007208

  • Lee T, Pappas C, Barrera D, Szalachowski P and Perrig A. Source Accountability with Domain-brokered Privacy. Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies. (345-358).

    https://doi.org/10.1145/2999572.2999581

  • Garcia-Luna-Aceves J. (2016). Towards Loop-Free Forwarding of Anonymous Internet Datagrams That Enforce Provenance GLOBECOM 2016 - 2016 IEEE Global Communications Conference. 10.1109/GLOCOM.2016.7842346. 978-1-5090-1328-9. (1-6).

    http://ieeexplore.ieee.org/document/7842346/

  • Liu Z, Jin H, Hu Y and Bailey M. MiddlePolice. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. (1268-1279).

    https://doi.org/10.1145/2976749.2978306

  • Shahbaz M, Choi S, Pfaff B, Kim C, Feamster N, McKeown N and Rexford J. PISCES. Proceedings of the 2016 ACM SIGCOMM Conference. (525-538).

    https://doi.org/10.1145/2934872.2934886

  • Meng H, Chen Z, Hu J and Guan Z. Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key. Proceedings of the 11th International Conference on Future Internet Technologies. (62-68).

    https://doi.org/10.1145/2935663.2935676

  • Guolong Chen , Guangwu Hu , Yong Jiang and Chaoqin Zhang . (2016). SAVSH: IP source address validation for SDN hybrid networks 2016 IEEE Symposium on Computers and Communication (ISCC). 10.1109/ISCC.2016.7543774. 978-1-5090-0679-3. (409-414).

    http://ieeexplore.ieee.org/document/7543774/

  • Al-Qudah Z, Johnson E, Rabinovich M and Spatscheck O. (2016). Internet with transient destination-controlled addressing. IEEE/ACM Transactions on Networking. 24:2. (731-744). Online publication date: 1-Apr-2016.

    https://doi.org/10.1109/TNET.2014.2382110

  • Xiao Z, Kathiresshan N and Xiao Y. (2016). A survey of accountability in computer networks and distributed systems. Security and Communication Networks. 9:4. (290-315). Online publication date: 10-Mar-2016.

    https://doi.org/10.1002/sec.574

  • Zhang H, Su W and Quan W. (2016). Efficient Mapping System of SINET. Smart Collaborative Identifier Network. 10.1007/978-3-662-49143-0_8. (161-184).

    http://link.springer.com/10.1007/978-3-662-49143-0_8

  • Mohaisen A, Mekky H, Zhang X, Xie H and Kim Y. Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures. IEEE Transactions on Dependable and Secure Computing. 10.1109/TDSC.2014.2382592. 12:6. (675-687).

    http://ieeexplore.ieee.org/document/6990508/

  • Pappas C, Reischuk R and Perrig A. (2015). FAIR: Forwarding Accountability for Internet Reputability 2015 IEEE 23rd International Conference on Network Protocols (ICNP). 10.1109/ICNP.2015.22. 978-1-4673-8295-3. (189-200).

    http://ieeexplore.ieee.org/document/7437128/

  • Levin D, Lee Y, Valenta L, Li Z, Lai V, Lumezanu C, Spring N and Bhattacharjee B. (2015). Alibi Routing. ACM SIGCOMM Computer Communication Review. 45:4. (611-624). Online publication date: 22-Sep-2015.

    https://doi.org/10.1145/2829988.2787509

  • Zhou D, Fan B, Lim H, Andersen D, Kaminsky M, Mitzenmacher M, Wang R and Singh A. (2015). Scaling Up Clustered Network Appliances with ScaleBricks. ACM SIGCOMM Computer Communication Review. 45:4. (241-254). Online publication date: 22-Sep-2015.

    https://doi.org/10.1145/2829988.2787503

  • Alsmadi I and Xu D. (2015). Security of Software Defined Networks. Computers and Security. 53:C. (79-108). Online publication date: 1-Sep-2015.

    https://doi.org/10.1016/j.cose.2015.05.006

  • Levin D, Lee Y, Valenta L, Li Z, Lai V, Lumezanu C, Spring N and Bhattacharjee B. Alibi Routing. Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. (611-624).

    https://doi.org/10.1145/2785956.2787509

  • Zhou D, Fan B, Lim H, Andersen D, Kaminsky M, Mitzenmacher M, Wang R and Singh A. Scaling Up Clustered Network Appliances with ScaleBricks. Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. (241-254).

    https://doi.org/10.1145/2785956.2787503

  • Fayaz S, Tobioka Y, Sekar V and Bailey M. Bohatei. Proceedings of the 24th USENIX Conference on Security Symposium. (817-832).

    /doi/10.5555/2831143.2831195

  • Wang P, Lan J, Hu Y and Chen S. (2015). Towards locality-aware DHT for fast mapping service in future Internet. Computer Communications. 66:C. (14-24). Online publication date: 15-Jul-2015.

    https://doi.org/10.1016/j.comcom.2015.04.003

  • Dwaraki A, Seetharaman S, Natarajan S and Wolf T. GitFlow. Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research. (1-6).

    https://doi.org/10.1145/2774993.2775064

  • Kwon J, Seo D, Kwon M, Lee H, Perrig A and Kim H. (2015). An incrementally deployable anti-spoofing mechanism for software-defined networks. Computer Communications. 64:C. (1-20). Online publication date: 15-Jun-2015.

    https://doi.org/10.1016/j.comcom.2015.03.003

  • Zhang F, Chenren Xu , Zhang Y, Ramakrishnan K, Mukherjee S, Yates R and Thu Nguyen . (2015). EdgeBuffer: Caching and prefetching content at the edge in the MobilityFirst future Internet architecture 2015 IEEE 16th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). 10.1109/WoWMoM.2015.7158137. 978-1-4799-8461-9. (1-9).

    https://ieeexplore.ieee.org/document/7158137

  • Moradi M, Qian F, Xu Q, Mao Z, Bethea D and Reiter M. Caesar. Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systems. (171-182).

    /doi/10.5555/2772722.2772745

  • Moradi M, Qian F, Xu Q, Mao Z, Bethea D and Reiter M. (2015). Caesar: high-speed and memory-efficient forwarding engine for future internet architecture 2015 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS). 10.1109/ANCS.2015.7110130. 978-1-4673-6633-5. (171-182).

    http://ieeexplore.ieee.org/document/7110130/

  • Sharma A, Tie X, Uppal H, Venkataramani A, Westbrook D and Yadav A. (2014). A global name service for a highly mobile internetwork. ACM SIGCOMM Computer Communication Review. 44:4. (247-258). Online publication date: 25-Feb-2015.

    https://doi.org/10.1145/2740070.2626331

  • Kim T, Basescu C, Jia L, Lee S, Hu Y and Perrig A. (2014). Lightweight source authentication and path validation. ACM SIGCOMM Computer Communication Review. 44:4. (271-282). Online publication date: 25-Feb-2015.

    https://doi.org/10.1145/2740070.2626323

  • Peter S, Javed U, Zhang Q, Woos D, Anderson T and Krishnamurthy A. (2014). One tunnel is (often) enough. ACM SIGCOMM Computer Communication Review. 44:4. (99-110). Online publication date: 25-Feb-2015.

    https://doi.org/10.1145/2740070.2626318

  • Naylor D, Mukerjee M and Steenkiste P. (2014). Balancing accountability and privacy in the network. ACM SIGCOMM Computer Communication Review. 44:4. (75-86). Online publication date: 25-Feb-2015.

    https://doi.org/10.1145/2740070.2626306

  • Castro I, Cardona J, Gorinsky S and Francois P. Remote Peering. Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies. (185-198).

    https://doi.org/10.1145/2674005.2675013

  • Wu H, Hsiao H and Hu Y. Efficient Large Flow Detection over Arbitrary Windows. Proceedings of the 2014 Conference on Internet Measurement Conference. (209-222).

    https://doi.org/10.1145/2663716.2663724

  • Wang X, Zhou H, Su J, Zhang B and Yang F. POSTER. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. (1520-1522).

    https://doi.org/10.1145/2660267.2662371

  • Lara A, Ramamurthy B, Nagaraja K, Krishnamoorthy A and Raychaudhuri D. (2014). Using OpenFlow to provide cut-through switching in MobilityFirst. Photonic Network Communications. 28:2. (165-177). Online publication date: 1-Oct-2014.

    https://doi.org/10.1007/s11107-014-0461-3

  • Liu X, Trappe W and Lindqvist J. A policy-driven approach to access control in future internet name resolution services. Proceedings of the 9th ACM workshop on Mobility in the evolving internet architecture. (7-12).

    https://doi.org/10.1145/2645892.2645897

  • Bechtold S and Perrig A. (2014). Accountability in future internet architectures. Communications of the ACM. 57:9. (21-23). Online publication date: 1-Sep-2014.

    https://doi.org/10.1145/2644146

  • Sharma A, Tie X, Uppal H, Venkataramani A, Westbrook D and Yadav A. A global name service for a highly mobile internetwork. Proceedings of the 2014 ACM conference on SIGCOMM. (247-258).

    https://doi.org/10.1145/2619239.2626331

  • Kim T, Basescu C, Jia L, Lee S, Hu Y and Perrig A. Lightweight source authentication and path validation. Proceedings of the 2014 ACM conference on SIGCOMM. (271-282).

    https://doi.org/10.1145/2619239.2626323

  • Peter S, Javed U, Zhang Q, Woos D, Anderson T and Krishnamurthy A. One tunnel is (often) enough. Proceedings of the 2014 ACM conference on SIGCOMM. (99-110).

    https://doi.org/10.1145/2619239.2626318

  • Naylor D, Mukerjee M and Steenkiste P. Balancing accountability and privacy in the network. Proceedings of the 2014 ACM conference on SIGCOMM. (75-86).

    https://doi.org/10.1145/2619239.2626306

  • Venkataramani A, Kurose J, Raychaudhuri D, Nagaraja K, Mao M and Banerjee S. (2014). MobilityFirst. ACM SIGCOMM Computer Communication Review. 44:3. (74-80). Online publication date: 28-Jul-2014.

    https://doi.org/10.1145/2656877.2656888

  • Naylor D, Mukerjee M, Agyapong P, Grandl R, Kang R, Machado M, Brown S, Doucette C, Hsiao H, Han D, Kim T, Lim H, Ovon C, Zhou D, Lee S, Lin Y, Stuart C, Barrett D, Akella A, Andersen D, Byers J, Dabbish L, Kaminsky M, Kiesler S, Peha J, Perrig A, Seshan S, Sirbu M and Steenkiste P. (2014). XIA. ACM SIGCOMM Computer Communication Review. 44:3. (50-57). Online publication date: 28-Jul-2014.

    https://doi.org/10.1145/2656877.2656885

  • Li J and Veeraraghavan M. (2014). A stub multi-homing solution for IPv6 networks ICC 2014 - 2014 IEEE International Conference on Communications. 10.1109/ICC.2014.6883818. 978-1-4799-2003-7. (3228-3234).

    http://ieeexplore.ieee.org/document/6883818/

  • Gong Q, Yang T, Tong H, Shi K, Li J and Wu X. (2014). Reducing the number of Bloom filters 2014 International Conference on Progress in Informatics and Computing (PIC). 10.1109/PIC.2014.6972399. 978-1-4799-2030-3. (572-576).

    http://ieeexplore.ieee.org/document/6972399/

  • CoLoR: an information-centric internet architecture for innovations. IEEE Network. 10.1109/MNET.2014.6843226. 28:3. (4-10).

    http://ieeexplore.ieee.org/document/6843226/

  • Heo J and Kim T. Network Modeling for Improving Scalability Using Graph Contraction Scheme. Proceedings of the 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation. (428-433).

    https://doi.org/10.1109/UKSim.2014.53

  • Lee S, Kang M and Gligor V. CoDef. Proceedings of the ninth ACM conference on Emerging networking experiments and technologies. (417-428).

    https://doi.org/10.1145/2535372.2535398

  • Zhou D, Fan B, Lim H, Kaminsky M and Andersen D. Scalable, high performance ethernet forwarding with CuckooSwitch. Proceedings of the ninth ACM conference on Emerging networking experiments and technologies. (97-108).

    https://doi.org/10.1145/2535372.2535379

  • Lara A, Ramamurthy B, Nagaraja K, Krishnamoorthy A and Raychaudhuri D. (2013). Cut-through switching options in a MobilityFirst network with openflow 2013 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS). 10.1109/ANTS.2013.6802877. 978-1-4799-1477-7. (1-6).

    http://ieeexplore.ieee.org/document/6802877/

  • Jiang J, Li W, Luo J and Tan J. (2013). Collaborative Technology. Journal of Network and Computer Applications. 36:6. (1671-1683). Online publication date: 1-Nov-2013.

    https://doi.org/10.1016/j.jnca.2012.12.029

  • Bronzino F, Nagaraja K, Seskar I and Raychaudhuri D. Network service abstractions for a mobility-centric future internet architecture. Proceedings of the eighth ACM international workshop on Mobility in the evolving internet architecture. (5-10).

    https://doi.org/10.1145/2505906.2505908

  • Kim J, Lee T and Jung H. (2013). Flat identifier to locator mapping scheme in the global internet 2013 Fourth International Conference on the Network of the Future (NOF). 10.1109/NOF.2013.6724520. 978-1-4799-1644-3. (1-5).

    http://ieeexplore.ieee.org/document/6724520/

  • Kim G and Lee W. (2013). Cannot take my allocation: Enforcing fairness by considering demand and payment in clouds 2013 Fourth International Conference on the Network of the Future (NOF). 10.1109/NOF.2013.6724514. 978-1-4799-1644-3. (1-5).

    http://ieeexplore.ieee.org/document/6724514/

  • Liu X, Trappe W and Zhang Y. (2013). Secure Name Resolution for Identifier-to-Locator Mappings in the Global Internet 2013 22nd International Conference on Computer Communication and Networks (ICCCN 2013). 10.1109/ICCCN.2013.6614191. 978-1-4673-5775-3. (1-7).

    http://ieeexplore.ieee.org/document/6614191/

  • Liu Z, Wang B, Wang T, Tian Y, Xu C, Wang Y, Yu W, Cruz C, Zhou S, Clune T and Klasky S. (2013). Profiling and Improving I/O Performance of a Large-Scale Climate Scientific Application 2013 22nd International Conference on Computer Communication and Networks (ICCCN 2013). 10.1109/ICCCN.2013.6614174. 978-1-4673-5775-3. (1-7).

    http://ieeexplore.ieee.org/document/6614174/

  • Liu X, Li K, Shen Y, Min G, Xiao B, Qu W and Li H. (2013). A Fast Approach to Unknown Tag Identification in Large Scale RFID Systems 2013 22nd International Conference on Computer Communication and Networks (ICCCN 2013). 10.1109/ICCCN.2013.6614086. 978-1-4673-5775-3. (1-7).

    http://ieeexplore.ieee.org/document/6614086/

  • Baid A, Mukherjee S, Tam Vu , Mudigonda S, Nagaraja K, Fukuyama J and Raychaudhuri D. (2013). Enabling vehicular networking in the MobilityFirst future internet architecture 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). 10.1109/WoWMoM.2013.6583417. 978-1-4673-5827-9. (1-3).

    http://ieeexplore.ieee.org/document/6583417/

  • Kang M, Lee S and Gligor V. The Crossfire Attack. Proceedings of the 2013 IEEE Symposium on Security and Privacy. (127-141).

    https://doi.org/10.1109/SP.2013.19

  • Mohaisen A, Zhang X, Schuchard M, Xie H and Kim Y. Protecting access privacy of cached contents in information centric networks. Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. (173-178).

    https://doi.org/10.1145/2484313.2484335

  • HASEGAWA T. (2013). A Survey of the Research on Future Internet and Network Architectures. IEICE Transactions on Communications. 10.1587/transcom.E96.B.1385. E96.B:6. (1385-1401).

    https://www.jstage.jst.go.jp/article/transcom/E96.B/6/E96.B_1385/_article

  • Venkataramani A, Sharma A, Tie X, Uppal H, Westbrook D, Kurose J and Raychaudhuri D. (2013). Design requirements of a global name service for a mobility-centric, trustworthy internetwork 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS). 10.1109/COMSNETS.2013.6465579. 978-1-4673-5494-3. (1-9).

    http://ieeexplore.ieee.org/document/6465579/

  • Raychaudhuri D, Nagaraja K and Venkataramani A. (2012). MobilityFirst. ACM SIGMOBILE Mobile Computing and Communications Review. 16:3. (2-13). Online publication date: 5-Dec-2012.

    https://doi.org/10.1145/2412096.2412098

  • Wahid A, Leckie C and Zhou C. Estimating the number of hosts corresponding to an address while preserving anonymity. Proceedings of the 6th international conference on Network and System Security. (166-179).

    https://doi.org/10.1007/978-3-642-34601-9_13

  • Raghavan B, Casado M, Koponen T, Ratnasamy S, Ghodsi A and Shenker S. Software-defined internet architecture. Proceedings of the 11th ACM Workshop on Hot Topics in Networks. (43-48).

    https://doi.org/10.1145/2390231.2390239

  • Boldyreva A and Lychev R. Provable security of S-BGP and other path vector protocols. Proceedings of the 2012 ACM conference on Computer and communications security. (541-552).

    https://doi.org/10.1145/2382196.2382254

  • Parno B, Zhou Z and Perrig A. Using trustworthy host-based information in the network. Proceedings of the seventh ACM workshop on Scalable trusted computing. (33-44).

    https://doi.org/10.1145/2382536.2382544

  • Nakamoto G, Durst R, Growney C, Andresen J, Ma J, Trivedi N, Quang R and Pisano D. (2012). Identity-Based Internet Protocol Networking MILCOM 2012 - 2012 IEEE Military Communications Conference. 10.1109/MILCOM.2012.6415566. 978-1-4673-1731-3. (1-6).

    http://ieeexplore.ieee.org/document/6415566/

  • Hummen R, Ziegeldorf J, Heer T, Wirtz H and Wehrle K. SEAMS. Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. (525-532).

    https://doi.org/10.1109/TrustCom.2012.250

  • Vu T, Baid A, Zhang Y, Nguyen T, Fukuyama J, Martin R and Raychaudhuri D. DMap. Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems. (698-707).

    https://doi.org/10.1109/ICDCS.2012.50

  • Han D, Anand A, Dogar F, Li B, Lim H, Machado M, Mukundan A, Wu W, Akella A, Andersen D, Byers J, Seshan S and Steenkiste P. XIA. Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. (23-23).

    /doi/10.5555/2228298.2228330

  • Raychaudhuri D and Mandayam N. Frontiers of Wireless and Mobile Communications. Proceedings of the IEEE. 10.1109/JPROC.2011.2182095. 100:4. (824-840).

    http://ieeexplore.ieee.org/document/6155060/

  • Cheng X, Su S, Zhang Z, Shuang K, Yang F, Luo Y and Wang J. (2012). Virtual network embedding through topology awareness and optimization. Computer Networks: The International Journal of Computer and Telecommunications Networking. 56:6. (1797-1813). Online publication date: 1-Apr-2012.

    https://doi.org/10.1016/j.comnet.2012.01.022

  • Li J, Veeraraghavan M, Reisslein M, Manley M, Williams R, Amer P and Leighton J. (2012). A Less-Is-More Architecture (LIMA) for a Future internet IEEE INFOCOM 2012 - IEEE Conference on Computer Communications Workshops. 10.1109/INFCOMW.2012.6193519. 978-1-4673-1017-8. (55-60).

    http://ieeexplore.ieee.org/document/6193519/

  • Hanka O. (2012). How to prevent identity fraud in locator/identifier — Split architectures 2012 International Conference on Computing, Networking and Communications (ICNC). 10.1109/ICCNC.2012.6167510. 978-1-4673-0009-4. (683-689).

    http://ieeexplore.ieee.org/document/6167510/

  • Naous J, Walfish M, Nicolosi A, Mazières D, Miller M and Seehra A. Verifying and enforcing network paths with icing. Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies. (1-12).

    https://doi.org/10.1145/2079296.2079326

  • Zhou W, Li Q, Caesar M and Godfrey P. ASAP. Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies. (1-12).

    https://doi.org/10.1145/2079296.2079316

  • Karaoglu H and Yuksel M. (2011). Effectiveness of Multi-Hop Negotiation on the Internet 2011 IEEE Global Communications Conference (GLOBECOM 2011). 10.1109/GLOCOM.2011.6133930. 978-1-4244-9268-8. (1-6).

    http://ieeexplore.ieee.org/document/6133930/

  • Chan A. (2011). Efficient defence against misbehaving TCP receiver DoS attacks. Computer Networks: The International Journal of Computer and Telecommunications Networking. 55:17. (3904-3914). Online publication date: 1-Dec-2011.

    https://doi.org/10.1016/j.comnet.2011.08.004

  • Ghodsi A, Shenker S, Koponen T, Singla A, Raghavan B and Wilcox J. Intelligent design enables architectural evolution. Proceedings of the 10th ACM Workshop on Hot Topics in Networks. (1-6).

    https://doi.org/10.1145/2070562.2070565

  • Anand A, Dogar F, Han D, Li B, Lim H, Machado M, Wu W, Akella A, Andersen D, Byers J, Seshan S and Steenkiste P. XIA. Proceedings of the 10th ACM Workshop on Hot Topics in Networks. (1-6).

    https://doi.org/10.1145/2070562.2070564

  • Seskar I, Nagaraja K, Nelson S and Raychaudhuri D. MobilityFirst future internet architecture project. Proceedings of the 7th Asian Internet Engineering Conference. (1-3).

    https://doi.org/10.1145/2089016.2089017

  • Shieh A, Sirer E and Schneider F. (2011). NetQuery. ACM SIGCOMM Computer Communication Review. 41:4. (278-289). Online publication date: 22-Oct-2011.

    https://doi.org/10.1145/2043164.2018469

  • Zhu M, Xu K and Li Q. Access path based source address validation in mobile IPv6. Proceedings of the 8th IFIP international conference on Network and parallel computing. (334-349).

    /doi/10.5555/2062932.2062967

  • Feigenbaum J, Jaggard A and Wright R. Towards a formal model of accountability. Proceedings of the 2011 New Security Paradigms Workshop. (45-56).

    https://doi.org/10.1145/2073276.2073282

  • Shieh A, Sirer E and Schneider F. NetQuery. Proceedings of the ACM SIGCOMM 2011 conference. (278-289).

    https://doi.org/10.1145/2018436.2018469

  • Koponen T, Shenker S, Balakrishnan H, Feamster N, Ganichev I, Ghodsi A, Godfrey P, McKeown N, Parulkar G, Raghavan B, Rexford J, Arianfar S and Kuptsov D. (2011). Architecting for innovation. ACM SIGCOMM Computer Communication Review. 41:3. (24-36). Online publication date: 5-Jul-2011.

    https://doi.org/10.1145/2002250.2002256

  • Hanka O and Lamberty J. (2011). Security Analysis of the Cryptographic Namespace Design in Next Generation Internet Architectures 2011 ICC - 2011 IEEE International Conference on Communication Workshop (ICC). 10.1109/iccw.2011.5963567. 978-1-61284-954-6. (1-6).

    http://ieeexplore.ieee.org/document/5963567/

  • Khor S and Nakao A. (2011). MI: Cross-Layer Malleable Identity ICC 2011 - 2011 IEEE International Conference on Communications. 10.1109/icc.2011.5963093. 978-1-61284-232-5. (1-6).

    http://ieeexplore.ieee.org/document/5963093/

  • Zhang X, Hsiao H, Hasker G, Chan H, Perrig A and Andersen D. SCION. Proceedings of the 2011 IEEE Symposium on Security and Privacy. (212-227).

    https://doi.org/10.1109/SP.2011.45

  • Afanasyev M, Kohno T, Ma J, Murphy N, Savage S, Snoeren A and Voelker G. (2011). Privacy-preserving network forensics. Communications of the ACM. 54:5. (78-87). Online publication date: 1-May-2011.

    https://doi.org/10.1145/1941487.1941508

  • Di Ma , Liming Wang , Tian Y and Mao W. (2011). Host-identifier-based scheme for source accountability of the internet 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM 2011). 10.1109/INM.2011.5990557. 978-1-4244-9219-0. (539-546).

    http://ieeexplore.ieee.org/document/5990557/

  • Li A, Liu X and Yang X. Bootstrapping accountability in the internet we have. Proceedings of the 8th USENIX conference on Networked systems design and implementation. (155-168).

    /doi/10.5555/1972457.1972474

  • Bernardo D and Hoang D. Empirical Survey. Proceedings of the 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications. (335-340).

    https://doi.org/10.1109/WAINA.2011.42

  • Mochizuki B, Kiyak F, Keller E and Caesar M. (2011). Better by a HAIR. Computer Networks: The International Journal of Computer and Telecommunications Networking. 55:4. (999-1010). Online publication date: 1-Mar-2011.

    https://doi.org/10.1016/j.comnet.2010.12.013

  • Luo H, Zhang H and Zukerman M. (2011). Decoupling the design of identifier-to-locator mapping services from identifiers. Computer Networks: The International Journal of Computer and Telecommunications Networking. 55:4. (959-974). Online publication date: 1-Mar-2011.

    https://doi.org/10.1016/j.comnet.2010.12.009

  • Hanka O, Eichhorn M, Pfannenstein M, Eberspächer J and Steinbach E. (2011). A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture. Future Internet. 10.3390/fi3010014. 3:1. (14-30).

    https://www.mdpi.com/1999-5903/3/1/14

  • Visala K, Lagutin D and Tarkoma S. Security design for an inter-domain publish/subscribe architecture. The future internet. (167-176).

    /doi/10.5555/1983741.1983753

  • Luo H, Zhang H and Qiao C. Efficient Mobility Support by Indirect Mapping in Networks With Locator/Identifier Separation. IEEE Transactions on Vehicular Technology. 10.1109/TVT.2011.2152867. 60:5. (2265-2279).

    http://ieeexplore.ieee.org/document/5765730/

  • Zhu M, Xu K and Li Q. (2011). Access Path Based Source Address Validation in Mobile IPv6. Network and Parallel Computing. 10.1007/978-3-642-24403-2_26. (334-349).

    http://link.springer.com/10.1007/978-3-642-24403-2_26

  • Wang X, Govindan K and Mohapatra P. (2010). Provenance-Based Information Trustworthiness Evaluation in Multi-Hop Networks GLOBECOM 2010 - 2010 IEEE Global Communications Conference. 10.1109/GLOCOM.2010.5684158. 978-1-4244-5636-9. (1-5).

    http://ieeexplore.ieee.org/document/5684158/

  • Wang Q, Chen Z, Chen C and Pissinou N. (2010). On the Robustness of the Botnet Topology Formed by Worm Infection GLOBECOM 2010 - 2010 IEEE Global Communications Conference. 10.1109/GLOCOM.2010.5684002. 978-1-4244-5636-9. (1-6).

    http://ieeexplore.ieee.org/document/5684002/

  • Wang K, Malozemoff A, Jia N, Han C and Maheswaran M. (2010). A Social Accountability Framework for Computer Networks GLOBECOM 2010 - 2010 IEEE Global Communications Conference. 10.1109/GLOCOM.2010.5683341. 978-1-4244-5636-9. (1-6).

    http://ieeexplore.ieee.org/document/5683341/

  • Shue C and Gupta M. (2010). An Internet without the Internet protocol. Computer Networks: The International Journal of Computer and Telecommunications Networking. 54:18. (3232-3245). Online publication date: 1-Dec-2010.

    https://doi.org/10.1016/j.comnet.2010.06.009

  • Singla A, Godfrey P, Fall K, Iannaccone G and Ratnasamy S. Scalable routing on flat names. Proceedings of the 6th International COnference. (1-12).

    https://doi.org/10.1145/1921168.1921195

  • Chu YuHunag , Tseng MinChi , Chen YaoTing , Chou YuChieh and Chen YanRen . (2010). A novel design for future on-demand service and security 2010 12th IEEE International Conference on Communication Technology (ICCT). 10.1109/ICCT.2010.5689156. 978-1-4244-6868-3. (385-388).

    http://ieeexplore.ieee.org/document/5689156/

  • Ganichev I, Dai B, Godfrey P and Shenker S. (2010). YAMR. ACM SIGCOMM Computer Communication Review. 40:5. (13-19). Online publication date: 22-Oct-2010.

    https://doi.org/10.1145/1880153.1880156

  • Popa L, Yu M, Ko S, Ratnasamy S and Stoica I. CloudPolice. Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks. (1-6).

    https://doi.org/10.1145/1868447.1868454

  • Popa L, Ghodsi A and Stoica I. HTTP as the narrow waist of the future internet. Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks. (1-6).

    https://doi.org/10.1145/1868447.1868453

  • Haeberlen A, Aditya P, Rodrigues R and Druschel P. Accountable virtual machines. Proceedings of the 9th USENIX conference on Operating systems design and implementation. (119-134).

    /doi/10.5555/1924943.1924952

  • Xiao Z, Xiao Y and Wu J. A Quantitative Study of Accountability in Wireless Multi-hop Networks. Proceedings of the 2010 39th International Conference on Parallel Processing. (198-207).

    https://doi.org/10.1109/ICPP.2010.29

  • Liu X, Yang X and Xia Y. NetFence. Proceedings of the ACM SIGCOMM 2010 conference. (255-266).

    https://doi.org/10.1145/1851182.1851214

  • Anwer M, Motiwala M, Tariq M and Feamster N. SwitchBlade. Proceedings of the ACM SIGCOMM 2010 conference. (183-194).

    https://doi.org/10.1145/1851182.1851206

  • Liu X, Yang X and Xia Y. (2010). NetFence. ACM SIGCOMM Computer Communication Review. 40:4. (255-266). Online publication date: 16-Aug-2010.

    https://doi.org/10.1145/1851275.1851214

  • Anwer M, Motiwala M, Tariq M and Feamster N. (2010). SwitchBlade. ACM SIGCOMM Computer Communication Review. 40:4. (183-194). Online publication date: 16-Aug-2010.

    https://doi.org/10.1145/1851275.1851206

  • Bernardo D and Hoang D. Security analysis of the proposed practical security mechanisms for high speed data transfer protocol. Proceedings of the 2010 international conference on Advances in computer science and information technology. (100-114).

    /doi/10.5555/1875558.1875568

  • Lagutin D and Tarkoma S. Cryptographic signatures on the network layer - an alternative to the ISP data retention. Proceedings of the The IEEE symposium on Computers and Communications. (87-93).

    https://doi.org/10.1109/ISCC.2010.5546745

  • Lee S and Gligor V. FLoc. Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems. (327-338).

    https://doi.org/10.1109/ICDCS.2010.78

  • Rabinovich M and Spatscheck O. (2010). Evasive Internet: Reducing Internet Vulnerability through Transient Addressing IEEE INFOCOM 2010 - IEEE Conference on Computer Communications Workshops. 10.1109/INFCOMW.2010.5466668. 978-1-4244-6739-6. (1-6).

    http://ieeexplore.ieee.org/document/5466668/

  • (2010). References. Overlay Networks. 10.1201/9781439813737-b. (217-234). Online publication date: 9-Feb-2010.

    http://www.crcnetbase.com/doi/10.1201/9781439813737-b

  • Anwer M and Feamster N. (2010). Building a fast, virtualized data plane with programmable hardware. ACM SIGCOMM Computer Communication Review. 40:1. (75-82). Online publication date: 7-Jan-2010.

    https://doi.org/10.1145/1672308.1672323

  • Bernardo D and Hoang D. (2010). Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol. Advances in Computer Science and Information Technology. 10.1007/978-3-642-13577-4_9. (100-114).

    http://link.springer.com/10.1007/978-3-642-13577-4_9

  • Xiao Z and Xiao Y. (2010). PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks. Information Security and Assurance. 10.1007/978-3-642-13365-7_15. (149-162).

    http://link.springer.com/10.1007/978-3-642-13365-7_15

  • Yu M, Fabrikant A and Rexford J. BUFFALO. Proceedings of the 5th international conference on Emerging networking experiments and technologies. (313-324).

    https://doi.org/10.1145/1658939.1658975

  • Luo H, Qin Y and Zhang H. (2009). A DHT-Based Identifier-to-Locator Mapping Approach for a Scalable Internet. IEEE Transactions on Parallel and Distributed Systems. 20:12. (1790-1802). Online publication date: 1-Dec-2009.

    https://doi.org/10.1109/TPDS.2009.30

  • Better by a HAIR. Proceedings of the 2009 17th IEEE International Conference on Network Protocols. ICNP 2009.

    https://doi.org/10.1109/ICNP.2009.5339694

  • Jagadeesan R, Jeffrey A, Pitcher C and Riely J. Towards a theory of accountability and audit. Proceedings of the 14th European conference on Research in computer security. (152-167).

    /doi/10.5555/1813084.1813098

  • Yu M and Rexford J. Hash, don't cache. Proceedings of the 1st ACM workshop on Research on enterprise networking. (37-44).

    https://doi.org/10.1145/1592681.1592688

  • Anwer M and Feamster N. Building a fast, virtualized data plane with programmable hardware. Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures. (1-8).

    https://doi.org/10.1145/1592648.1592650

  • De Carli L, Pan Y, Kumar A, Estan C and Sankaralingam K. (2009). PLUG. ACM SIGCOMM Computer Communication Review. 39:4. (207-218). Online publication date: 16-Aug-2009.

    https://doi.org/10.1145/1594977.1592593

  • Xie Y, Yu F and Abadi M. (2009). De-anonymizing the internet using unreliable IDs. ACM SIGCOMM Computer Communication Review. 39:4. (75-86). Online publication date: 16-Aug-2009.

    https://doi.org/10.1145/1594977.1592579

  • De Carli L, Pan Y, Kumar A, Estan C and Sankaralingam K. PLUG. Proceedings of the ACM SIGCOMM 2009 conference on Data communication. (207-218).

    https://doi.org/10.1145/1592568.1592593

  • Xie Y, Yu F and Abadi M. De-anonymizing the internet using unreliable IDs. Proceedings of the ACM SIGCOMM 2009 conference on Data communication. (75-86).

    https://doi.org/10.1145/1592568.1592579

  • Wang C, Chen S and Zic J. A Contract-Based Accountability Service Model. Proceedings of the 2009 IEEE International Conference on Web Services. (639-646).

    https://doi.org/10.1109/ICWS.2009.53

  • Zahemszky A, Csaszar A, Nikander P and Esteve Rothenberg C. (2009). Exploring the Pub/Sub Routing & Forwarding Space 2009 IEEE International Conference on Communications Workshops. 10.1109/ICCW.2009.5207980. 978-1-4244-3437-4. (1-6).

    http://ieeexplore.ieee.org/document/5207980/

  • Primet P, Gelas J, Mornard O, Koslovski G, Roca V, Giraud L, Montagnat J and Huu T. A Scalable Security Model for Enabling Dynamic Virtual Private Execution Infrastructures on the Internet. Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid. (348-355).

    https://doi.org/10.1109/CCGRID.2009.76

  • Haeberlen A, Avramopoulos I, Rexford J and Druschel P. NetReview. Proceedings of the 6th USENIX symposium on Networked systems design and implementation. (437-452).

    /doi/10.5555/1558977.1559007

  • Soldo F, Markopoulou A and Argyraki K. (2009). Optimal Filtering of Source Address Prefixes: Models and Algorithms 2009 Proceedings IEEE INFOCOM. 10.1109/INFCOM.2009.5062172. 978-1-4244-3512-8. (2446-2454).

    http://ieeexplore.ieee.org/document/5062172/

  • Kim C, Caesar M, Gerber A and Rexford J. Revisiting Route Caching. Proceedings of the 10th International Conference on Passive and Active Network Measurement. (3-12).

    /doi/10.5555/1532940.1532942

  • Kim C, Caesar M, Gerber A and Rexford J. (2009). Revisiting Route Caching: The World Should Be Flat. Passive and Active Network Measurement. 10.1007/978-3-642-00975-4_1. (3-12).

    http://link.springer.com/10.1007/978-3-642-00975-4_1

  • Mirkovic J and Reiher P. (2008). Building accountability into the future Internet 2008 4th Workshop on Secure Network Protocols (NPSec). 10.1109/NPSEC.2008.4664880. 978-1-4244-2651-5. (45-51).

    http://ieeexplore.ieee.org/document/4664880/

  • Bao H, Zhang X, Wang G, Tian R, Duan J and Zhao Y. (2023). Smart-PKI: A Blockchain-based Distributed Identity Validation Scheme for IoT Devices ICC 2023 - IEEE International Conference on Communications. 10.1109/ICC45041.2023.10279752. 978-1-5386-7462-8. (4749-4754).

    https://ieeexplore.ieee.org/document/10279752/

  • Bao H, Zhang X, Wang G, Zhang M, Wang Y and Zhao Y. (2023). RepuFilter: Prevention of Untrusted Packet Spread Based on Trust Evaluation in Wireless Networks ICC 2023 - IEEE International Conference on Communications. 10.1109/ICC45041.2023.10278691. 978-1-5386-7462-8. (5972-5977).

    https://ieeexplore.ieee.org/document/10278691/

  • Alsubhi K, Alzahrani B, Fotiou N, Albeshri A and Alreshoodi M. (2022). Reliable Application Layer Routing Using Decentralized Identifiers. Future Internet. 10.3390/fi14110322. 14:11. (322).

    https://www.mdpi.com/1999-5903/14/11/322

  • Bu K, Laird A, Yang Y, Cheng L, Luo J, Li Y and Ren K. (2020). Unveiling the Mystery of Internet Packet Forwarding. ACM Computing Surveys. 53:5. (1-34). Online publication date: 30-Sep-2021.

    https://doi.org/10.1145/3409796

  • Li P, Su J, Wang X, Xing Q and Maglaras L. (2021). DIIA. Security and Communication Networks. 2021. Online publication date: 1-Jan-2021.

    https://doi.org/10.1155/2021/1974493

  • Ma Y, Wu Y and Ge J. (2020). A Comprehensive Survey. Accountability and Privacy in Network Security. 10.1007/978-981-15-6575-5_2. (11-25).

    http://link.springer.com/10.1007/978-981-15-6575-5_2

  • Mohammad Hosseini S, Jahangir A and Kazemi M. Digesting Network Traffic for Forensic Investigation Using Digital Signal Processing Techniques. IEEE Transactions on Information Forensics and Security. 10.1109/TIFS.2019.2915190. 14:12. (3312-3321).

    https://ieeexplore.ieee.org/document/8708677/

  • Shi J, Mu D and Sha M. (2019). LoRaBee: Cross-Technology Communication from LoRa to ZigBee via Payload Encoding 2019 IEEE 27th International Conference on Network Protocols (ICNP). 10.1109/ICNP.2019.8888145. 978-1-7281-2700-2. (1-11).

    https://ieeexplore.ieee.org/document/8888145/

  • Shi S, Qian C and Wang M. (2019). Re-designing Compact-structure based Forwarding for Programmable Networks 2019 IEEE 27th International Conference on Network Protocols (ICNP). 10.1109/ICNP.2019.8888050. 978-1-7281-2700-2. (1-11).

    https://ieeexplore.ieee.org/document/8888050/

  • Yao Z, Ge J, Wu Y and Jian L. (2019). A privacy preserved and credible network protocol. Journal of Parallel and Distributed Computing. 132:C. (150-159). Online publication date: 1-Oct-2019.

    https://doi.org/10.1016/j.jpdc.2019.06.002

  • Li Y, Kim K, Vlachou C and Xie J. Bridging the data charging gap in the cellular edge. Proceedings of the ACM Special Interest Group on Data Communication. (15-28).

    https://doi.org/10.1145/3341302.3342074

  • Li C, Wu Q, Li H and Zhou J. (2019). SDN-Ti: A General Solution Based on SDN to Attacker Traceback and Identification in IPv6 Networks ICC 2019 - 2019 IEEE International Conference on Communications (ICC). 10.1109/ICC.2019.8761485. 978-1-5386-8088-9. (1-7).

    https://ieeexplore.ieee.org/document/8761485/

  • Schmitt P, Edmundson A, Mankin A and Feamster N. (2019). Oblivious DNS: Practical Privacy for DNS Queries. Proceedings on Privacy Enhancing Technologies. 10.2478/popets-2019-0028. 2019:2. (228-244). Online publication date: 1-Apr-2019.. Online publication date: 1-Apr-2019.

    https://petsymposium.org/popets/2019/popets-2019-0028.php

  • Fragkouli G, Argyraki K and Ford B. (2019). MorphIT: Morphing Packet Reports for Internet Transparency. Proceedings on Privacy Enhancing Technologies. 10.2478/popets-2019-0021. 2019:2. (88-104). Online publication date: 1-Apr-2019.. Online publication date: 1-Apr-2019.

    https://petsymposium.org/popets/2019/popets-2019-0021.php

  • Xiao Y, Zeng L, Chen H and Li T. Prototyping Flow-Net Logging for Accountability Management in Linux Operating Systems. IEEE Access. 10.1109/ACCESS.2019.2937637. 7. (131172-131187).

    https://ieeexplore.ieee.org/document/8813093/

  • Park J, Ha J, Kang B and Kim M. (2019). MoHoP: A protocol providing for both mobility management and host privacy. Computer Networks. 10.1016/j.comnet.2018.10.014. 148. (20-33). Online publication date: 1-Jan-2019.

    https://linkinghub.elsevier.com/retrieve/pii/S1389128618311022

  • Xing Q, Wang B and Wang X. (2018). BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution. Symmetry. 10.3390/sym10090408. 10:9. (408).

    https://www.mdpi.com/2073-8994/10/9/408

  • Liu Z, Jin H, Hu Y and Bailey M. (2018). Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control. IEEE/ACM Transactions on Networking. 26:4. (1948-1961). Online publication date: 1-Aug-2018.

    https://doi.org/10.1109/TNET.2018.2854795

  • Yu Y, Belazzougui D, Qian C and Zhang Q. (2018). Memory-Efficient and Ultra-Fast Network Lookup and Forwarding Using Othello Hashing. IEEE/ACM Transactions on Networking. 26:3. (1151-1164). Online publication date: 1-Jun-2018.

    https://doi.org/10.1109/TNET.2018.2820067

  • Dogar F. (2018). Towards Slack-Aware Networking. ACM SIGCOMM Computer Communication Review. 48:2. (24-30). Online publication date: 1-May-2018.

    https://doi.org/10.1145/3213232.3213236

  • Hosseini S and Jahangir A. An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling. IEEE Transactions on Information Forensics and Security. 10.1109/TIFS.2017.2769018. 13:4. (850-860).

    http://ieeexplore.ieee.org/document/8093697/

  • Grewe D, Wagner M and Frey H. A Domain-Specific Comparison of Information-Centric Networking Architectures for Connected Vehicles. IEEE Communications Surveys & Tutorials. 10.1109/COMST.2018.2817653. 20:3. (2372-2388).

    https://ieeexplore.ieee.org/document/8320786/

  • He L, Liu Y and Ren G. Network-Layer Accountability Protocols: A Survey. IEEE Access. 10.1109/ACCESS.2018.2879489. 6. (66886-66902).

    https://ieeexplore.ieee.org/document/8528341/

  • Zhang C, Hu G, Chen G, Sangaiah A, Zhang P, Yan X and Jiang W. Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack. IEEE Access. 10.1109/ACCESS.2017.2785236. 6. (22764-22777).

    https://ieeexplore.ieee.org/document/8226750/

  • Mukherjee S, Sriram S, Vu T and Raychaudhuri D. (2017). EIR: Edge-aware inter-domain routing protocol for the future mobile internet. Computer Networks. 10.1016/j.comnet.2017.07.013. 127. (13-30). Online publication date: 1-Nov-2017.

    https://linkinghub.elsevier.com/retrieve/pii/S1389128617302943

  • Luo H, Chen Z, Li J and Vasilakos A. (2017). Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers. IEEE Transactions on Information Forensics and Security. 12:8. (1801-1815). Online publication date: 1-Aug-2017.

    https://doi.org/10.1109/TIFS.2017.2688414

  • Scott W. A Secure, Practical & Safe Packet Spoofing Service. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. (926-928).

    https://doi.org/10.1145/3052973.3055155

  • Kacianka S, Beckers K, Kelbert F and Kumari P. (2017). How Accountability is Implemented and Understood in Research Tools. Product-Focused Software Process Improvement. 10.1007/978-3-319-69926-4_15. (199-218).

    http://link.springer.com/10.1007/978-3-319-69926-4_15

  • Shahbaz M, Choi S, Pfaff B, Kim C, Feamster N, McKeown N and Rexford J. PISCES. Proceedings of the 2016 ACM SIGCOMM Conference. (525-538).

    https://doi.org/10.1145/2934872.2934886

  • Conti M, Dragoni N and Lesyk V. (2016). A Survey of Man In The Middle Attacks. IEEE Communications Surveys & Tutorials. 18:3. (2027-2051). Online publication date: 1-Jul-2016.

    https://doi.org/10.1109/COMST.2016.2548426

  • Zhang H, Su W and Quan W. (2016). Scalable Routing Technologies of SINET. Smart Collaborative Identifier Network. 10.1007/978-3-662-49143-0_7. (141-160).

    http://link.springer.com/10.1007/978-3-662-49143-0_7

  • Liu Y, Ren G, Wu J, Zhang S, He L and Jia Y. (2015). Building an IPv6 address generation and traceback system with NIDTGA in Address Driven Network在地址驱动网络中构建嵌入可扩展用户网络身份标识和时间信息的 IPv6 地址生成和追溯系统. Science China Information Sciences. 10.1007/s11432-015-5461-0. 58:12. (1-14). Online publication date: 1-Dec-2015.

    http://link.springer.com/10.1007/s11432-015-5461-0

  • Chen P, Wang X, Wu Y, Su J and Zhou H. POSTER. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. (1632-1634).

    https://doi.org/10.1145/2810103.2810116

  • Berman M, Demeester P, Lee J, Nagaraja K, Zink M, Colle D, Krishnappa D, Raychaudhuri D, Schulzrinne H, Seskar I and Sharma S. (2015). Future internets escape the simulator. Communications of the ACM. 58:6. (78-89). Online publication date: 21-May-2015.

    https://doi.org/10.1145/2699392

  • Qiu X, Liu J, Wu Q and Zhong Q. (2015). Multipath Inter-Domain Routing Decision Verification Protocol. Applied Mechanics and Materials. 10.4028/www.scientific.net/AMM.713-715.2269. 713-715. (2269-2275).

    https://www.scientific.net/AMM.713-715.2269

  • Xu K, Zhu M, Hu G, Zhu L, Zhong Y, Liu Y, Wu J and Wang N. (2014). Towards evolvable Internet architecture-design constraints and models analysis. Science China Information Sciences. 10.1007/s11432-014-5134-4. 57:11. (1-24). Online publication date: 1-Nov-2014.

    http://link.springer.com/10.1007/s11432-014-5134-4

  • Al-Ameen M and Wright M. Design and evaluation of persea, a sybil-resistant DHT. Proceedings of the 9th ACM symposium on Information, computer and communications security. (75-86).

    https://doi.org/10.1145/2590296.2590326

  • Campista M, Rubinstein M, Moraes I, Costa L and Duarte O. Challenges and Research Directions for the Future Internetworking. IEEE Communications Surveys & Tutorials. 10.1109/SURV.2013.100213.00143. 16:2. (1050-1079).

    http://ieeexplore.ieee.org/document/6644748/

  • Karimi K and Hauser C. (2013). Internet Unite-and-Conquer architecture 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST). 10.1109/ICITST.2013.6750195. 978-1-908320-20-9. (219-230).

    http://ieeexplore.ieee.org/document/6750195/

  • Wolff J. (2013). Application-layer design patterns for accountable-anonymous online identities. Telecommunications Policy. 37:9. (748-756). Online publication date: 1-Oct-2013.

    https://doi.org/10.1016/j.telpol.2013.04.001

  • LIU Y, LIU Z, WANG B and YANG Q. (2013). SIR: A Secure Identifier-Based Inter-Domain Routing for Identifier/Locator Split Network. IEICE Transactions on Communications. 10.1587/transcom.E96.B.1742. E96.B:7. (1742-1752).

    https://www.jstage.jst.go.jp/article/transcom/E96.B/7/E96.B_1742/_article

  • Dogar F and Steenkiste P. Architecting for edge diversity. Proceedings of the 8th international conference on Emerging networking experiments and technologies. (13-24).

    https://doi.org/10.1145/2413176.2413179

  • Jiang J, Luo J, Li W and Tan J. (2012). A Routing Collaboration Accountability Mechanism in Trustworthy and Controllable Network 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 10.1109/CSCWD.2012.6221806. 978-1-4673-1212-7. (113-120).

    http://ieeexplore.ieee.org/document/6221806/

  • Cheng X, Su S, Zhang Z, Shuang K, Yang F, Luo Y and Wang J. (2012). Virtual network embedding through topology awareness and optimization. Computer Networks: The International Journal of Computer and Telecommunications Networking. 56:6. (1797-1813). Online publication date: 1-Apr-2012.

    https://doi.org/10.1016/j.comnet.2012.01.022

  • Chen S, Levy D and Yao J. (2012). Accountability for Service Compliance. International Journal of Systems and Service-Oriented Engineering. 3:1. (16-43). Online publication date: 1-Jan-2012.

    https://doi.org/10.4018/jssoe.2012010102

  • Hu G, Wu J, Xu K and Chen W. (2011). SAVT: A Practical Scheme for Source Address Validation and Traceback in Campus Network 2011 20th International Conference on Computer Communications and Networks (ICCCN 2011). 10.1109/ICCCN.2011.6005783. 978-1-4577-0637-0. (1-8).

    http://ieeexplore.ieee.org/document/6005783/

  • Moreira M, Laufer R, Fernandes N and Duarte O. (2011). A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet ICC 2011 - 2011 IEEE International Conference on Communications. 10.1109/icc.2011.5962652. 978-1-61284-232-5. (1-6).

    http://ieeexplore.ieee.org/document/5962652/

  • Bernardo D and Hoang D. (2011). Formalization and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDT. Security Technology. 10.1007/978-3-642-27189-2_20. (183-194).

    http://link.springer.com/10.1007/978-3-642-27189-2_20

  • Visala K, Lagutin D and Tarkoma S. (2011). Security Design for an Inter-Domain Publish/Subscribe Architecture. The Future Internet. 10.1007/978-3-642-20898-0_12. (167-176).

    http://link.springer.com/10.1007/978-3-642-20898-0_12

  • Paul S, Pan J and Jain R. (2010). A Future Internet Architecture Based on De-Conflated Identities GLOBECOM 2010 - 2010 IEEE Global Communications Conference. 10.1109/GLOCOM.2010.5683385. 978-1-4244-5636-9. (1-6).

    http://ieeexplore.ieee.org/document/5683385/

  • Xiao Z and Xiao Y. (2010). P-Accountable Networked Systems IEEE INFOCOM 2010 - IEEE Conference on Computer Communications Workshops. 10.1109/INFCOMW.2010.5466640. 978-1-4244-6739-6. (1-5).

    http://ieeexplore.ieee.org/document/5466640/

  • Guo H, Gao S and Zhang H. (2009). Inter-Domain Routing with AS Number: A Traffic Engineering Perspective 2009 International Symposium on Computer Network and Multimedia Technology (CNMT 2009). 10.1109/CNMT.2009.5374756. 978-1-4244-5272-9. (1-4).

    http://ieeexplore.ieee.org/document/5374756/

  • Guo L, Yang S, Zhang R, Niu X and Song H. (2009). RBMA: Replication Based on Multilevel-Agent for P2P Systems 2009 International Symposium on Computer Network and Multimedia Technology (CNMT 2009). 10.1109/CNMT.2009.5374717. 978-1-4244-5272-9. (1-5).

    http://ieeexplore.ieee.org/document/5374717/

  • Mallios Y, Modi S, Agarwala A and Johns C. (2009). Persona: Network Layer Anonymity and Accountability for Next Generation Internet. Emerging Challenges for Security, Privacy and Trust. 10.1007/978-3-642-01244-0_36. (410-420).

    http://link.springer.com/10.1007/978-3-642-01244-0_36

  • Esteve C, Verdi F and Magalhães M. Towards a new generation of information-oriented internetworking architectures. Proceedings of the 2008 ACM CoNEXT Conference. (1-6).

    https://doi.org/10.1145/1544012.1544077

  • Wolff J. Unraveling Internet Identities: Embedding Accountability & Anonymity at the Application Layer. SSRN Electronic Journal. 10.2139/ssrn.2046826.

    http://www.ssrn.com/abstract=2046826