Networks Research Group
Networks Research Group
Tour
People
Project
Publications
News
Events
Contact
Security
Towards Measuring Quality of Service in Untrusted Multi-Vendor Service Function Chains: Balancing Security and Resource Consumption
The IT infrastructure of large organizations consists of devices and software services purchased from multiple vendors. The problem of …
Prasanna Karthik Vairam
,
Gargi Mitra
,
Vignesh Manoharan
,
Chester Rebeiro
,
Byrav Ramamurthy
,
Kamakoti
Cite
DOI
URL
Towards Measuring Quality of Service in Untrusted Multi-Vendor Service Function Chains: Balancing Security and Resource Consumption
The IT infrastructure of large organizations consists of devices and software services purchased from multiple vendors. The problem of …
Prasanna Karthik Vairam
,
Gargi Mitra
,
Vignesh Manoharan
,
Chester Rebeiro
,
Byrav Ramamurthy
,
Kamakoti
Cite
DOI
URL
Securing Large-scale Data Transfers in Campus Networks: Experiences, Issues, and Challenges
Increasingly, campus networks manage a multitude of large-scale data transfers. Big data plays a pivotal role in university research …
Deepak Nadig
,
Byrav Ramamurthy
Cite
DOI
URL
Optimized Service Chain Mapping and reduced flow processing with Application-Awareness
Network Function Virtualization (NFV) brings a new set of challenges when deploying virtualized services on commercial-off-the-shelf …
Deepak Nadig
,
Byrav Ramamurthy
,
Brian Bockelman
,
David Swanson
Cite
DOI
URL
Remote mobile screen (RMS): An approach for secure BYOD environments
The introduction of bring your own device (BYOD) policy in the corporate world creates benefits for companies as well as job …
Santiago Gimenez Ocano
,
Byrav Ramamurthy
,
Yong Wang
Cite
DOI
URL
OpenSec: A framework for implementing security policies using OpenFlow
As the popularity of software defined networks (SDN) and OpenFlow increases, policy-driven network management has received more …
Adrian Lara
,
Byrav Ramamurthy
Cite
DOI
URL
Key management protocols in hybrid wireless sensor networks
Wireless sensor networks (WSNs) use sensors to monitor phenomena such as temperature, humidity, groundwater levels and transmit this …
Yong Wang
Cite
URL
Distributed hybrid agent based intrusion detection and real time response system
Wireless LANs are growing rapidly and security has always been a concern. We have implemented a hybrid system, which does not only …
V. Kasarekar
,
B. Ramamurthy
Cite
DOI
URL
Cite
×