default search action
Sandra Scott-Hayward
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Noe Marcelo Yungaicela-Naula, Vishal Sharma, Sandra Scott-Hayward:
Misconfiguration in O-RAN: Analysis of the impact of AI/ML. Comput. Networks 247: 110455 (2024) - [j16]Conor Black, Sandra Scott-Hayward:
Defeating Data Plane Attacks With Program Obfuscation. IEEE Trans. Dependable Secur. Comput. 21(3): 1317-1330 (2024) - [i6]Noe Marcelo Yungaicela-Naula, Vishal Sharma, Sandra Scott-Hayward:
Misconfiguration in O-RAN: Analysis of the impact of AI/ML. CoRR abs/2403.01180 (2024) - 2023
- [j15]Dylan Smyth, Sandra Scott-Hayward, Victor Cionca, Seán McSweeney, Donna O'Shea:
SECAP Switch - Defeating Topology Poisoning Attacks Using P4 Data Planes. J. Netw. Syst. Manag. 31(1): 28 (2023) - [c22]Sandra Scott-Hayward:
Secure, Intelligent, Programmable Space-Air-Ground Integrated Networks. ARTMAN@CCS 2023: 1 - 2022
- [j14]Rémi Badonnel, Carol J. Fung, Sandra Scott-Hayward, Qi Li, Fulvio Valenza, Cristian Hesselman:
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management. IEEE Trans. Netw. Serv. Manag. 19(3): 2251-2254 (2022) - [c21]Conor Black, Sandra Scott-Hayward:
Investigating the Vulnerability of Programmable Data Planes to Static Analysis-Guided Attacks. NetSoft 2022: 411-419 - [c20]Jacob Steadman, Sandra Scott-Hayward:
Detecting Data Exfiltration over Encrypted DNS. NetSoft 2022: 429-437 - [i5]Maged AbdelAty, Sandra Scott-Hayward, Roberto Doriguzzi Corin, Domenico Siracusa:
GADoT: GAN-based Adversarial Training for Robust DDoS Attack Detection. CoRR abs/2201.13102 (2022) - 2021
- [j13]Jacob Steadman, Sandra Scott-Hayward:
DNSxP: Enhancing data exfiltration protection through data plane programmability. Comput. Networks 195: 108174 (2021) - [j12]Rémi Badonnel, Carol J. Fung, Sandra Scott-Hayward, Qi Li, Jie Zhang, Cristian Hesselman:
Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services. IEEE Trans. Netw. Serv. Manag. 18(2): 1120-1124 (2021) - [c19]Maged AbdelAty, Sandra Scott-Hayward, Roberto Doriguzzi Corin, Domenico Siracusa:
GADoT: GAN-based Adversarial Training for Robust DDoS Attack Detection. CNS 2021: 119-127 - [c18]Conor Black, Sandra Scott-Hayward:
Adversarial Exploitation of P4 Data Planes. IM 2021: 508-514 - 2020
- [j11]Seungsoo Lee, Jinwoo Kim, Seungwon Woo, Changhoon Yoon, Sandra Scott-Hayward, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
A comprehensive security assessment framework for software-defined networks. Comput. Secur. 91: 101720 (2020) - [j10]Rémi Badonnel, Carol J. Fung, Qi Li, Sandra Scott-Hayward:
Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems. IEEE Trans. Netw. Serv. Manag. 17(1): 12-14 (2020) - [j9]Roberto Doriguzzi Corin, Sandra Scott-Hayward, Domenico Siracusa, Marco Savi, Elio Salvadori:
Dynamic and Application-Aware Provisioning of Chained Virtual Security Network Functions. IEEE Trans. Netw. Serv. Manag. 17(1): 294-307 (2020) - [j8]Roberto Doriguzzi Corin, Stuart Millar, Sandra Scott-Hayward, Jesús Martínez del Rincón, Domenico Siracusa:
Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection. IEEE Trans. Netw. Serv. Manag. 17(2): 876-889 (2020) - [c17]Victoria Wallace, Sandra Scott-Hayward:
Can SDN deanonymize Bitcoin users? ICC 2020: 1-7 - [p1]Agathe Blaise, Sandra Scott-Hayward, Stefano Secci:
Scalable and Collaborative Intrusion Detection and Prevention Systems Based on SDN and NFV. Guide to Disaster-Resilient Communication Networks 2020: 653-673 - [i4]Roberto Doriguzzi Corin, Stuart Millar, Sandra Scott-Hayward, Jesús Martínez del Rincón, Domenico Siracusa:
LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection. CoRR abs/2002.04902 (2020)
2010 – 2019
- 2019
- [j7]Yeonkeun Kim, Jaehyun Nam, Taejune Park, Sandra Scott-Hayward, Seungwon Shin:
SODA: A software-defined security framework for IoT environments. Comput. Networks 163 (2019) - [c16]James Aiken, Sandra Scott-Hayward:
Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs. NFV-SDN 2019: 1-7 - [i3]Roberto Doriguzzi Corin, Sandra Scott-Hayward, Domenico Siracusa, Marco Savi, Elio Salvadori:
Dynamic and Application-Aware Provisioning of Chained Virtual Security Network Functions. CoRR abs/1901.01704 (2019) - 2018
- [j6]Lyndon Fawcett, Sandra Scott-Hayward, Matthew Broadbent, Andrew Wright, Nicholas J. P. Race:
Tennison: A Distributed SDN Framework for Scalable Network Security. IEEE J. Sel. Areas Commun. 36(12): 2805-2818 (2018) - [j5]Wolfgang Kellerer, Raouf Boutaba, Prosper Chemouil, Rafael Pasquini, Giovanni Schembra, Stefan Schmid, Sandra Scott-Hayward, Kohei Shiomoto:
Guest Editors' Introduction: Special Section on Novel Techniques for Managing Softwarized Networks. IEEE Trans. Netw. Serv. Manag. 15(4): 1192-1196 (2018) - [c15]Sandra Scott-Hayward, Thianantha Arumugam:
OFMTL-SEC: State-based Security for Software Defined Networks. NFV-SDN 2018: 1-7 - [c14]Jacob Steadman, Sandra Scott-Hayward:
DNSxD: Detecting Data Exfiltration Over DNS. NFV-SDN 2018: 1-6 - 2017
- [c13]Roberto Doriguzzi Corin, Sandra Scott-Hayward, Domenico Siracusa, Elio Salvadori:
Application-Centric provisioning of virtual security network functions. NFV-SDN 2017: 276-279 - [c12]Thianantha Arumugam, Sandra Scott-Hayward:
Demonstrating state-based security protection mechanisms in software defined networks. NOF 2017: 123-125 - [e1]Shao Ying Zhu, Sandra Scott-Hayward, Ludovic Jacquin, Richard Hill:
Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications. Computer Communications and Networks, Springer 2017, ISBN 978-3-319-64652-7 [contents] - [i2]Sandra Scott-Hayward:
Trailing the Snail: SDN Controller Security Evolution. CoRR abs/1711.08406 (2017) - 2016
- [j4]Sandra Scott-Hayward, Sriram Natarajan, Sakir Sezer:
A Survey of Security in Software Defined Networks. IEEE Commun. Surv. Tutorials 18(1): 623-654 (2016) - [c11]Arash Shaghaghi, Mohamed Ali Kâafar, Sandra Scott-Hayward, Salil S. Kanhere, Sanjay K. Jha:
Towards Policy Enforcement Point as a Service (PEPS). NFV-SDN 2016: 50-55 - [c10]Keissy Guerra Perez, Xin Yang, Sandra Scott-Hayward, Sakir Sezer:
Feature study on a programmable network traffic classifier. SoCC 2016: 108-113 - [i1]Arash Shaghaghi, Mohamed Ali Kâafar, Sandra Scott-Hayward, Salil S. Kanhere, Sanjay K. Jha:
Towards Policy Enforcement Point as a Service (PEPS). CoRR abs/1610.02526 (2016) - 2015
- [j3]Sandra Scott-Hayward, Emiliano Garcia-Palacios:
Multimedia resource allocation in mmwave 5G networks. IEEE Commun. Mag. 53(1): 240-247 (2015) - [c9]Keissy Guerra Perez, Sandra Scott-Hayward, Xin Yang, Sakir Sezer:
Memory cost analysis for OpenFlow multiple table lookup. SoCC 2015: 322-327 - 2014
- [j2]Sandra Scott-Hayward, Emiliano Garcia-Palacios:
Channel Time Allocation PSO for Gigabit Multimedia Wireless Networks. IEEE Trans. Multim. 16(3): 828-836 (2014) - [c8]K. Guerra Perez, Xin Yang, Sandra Scott-Hayward, Sakir Sezer:
Optimized packet classification for Software-Defined Networking. ICC 2014: 859-864 - [c7]Sandra Scott-Hayward, Christopher Kane, Sakir Sezer:
OperationCheckpoint: SDN Application Control. ICNP 2014: 618-623 - [c6]Keissy Guerra Perez, Xin Yang, Sandra Scott-Hayward, Sakir Sezer:
A configurable packet classification architecture for Software-Defined Networking. SoCC 2014: 353-358 - [c5]Sandra Scott-Hayward, Emiliano Garcia-Palacios:
Utility-based resource allocation for real-time IPTV in wireless networks. WCNC 2014: 1921-1926 - 2013
- [b1]Sandra Scott-Hayward:
Resource management strategies for Gigabit wireless multimedia systems. Queen's University Belfast, UK, 2013 - [j1]Sakir Sezer, Sandra Scott-Hayward, Pushpinder-Kaur Chouhan, Barbara Fraser, David Lake, Jim Finnegan, Niel Viljoen, Marc Miller, Navneet Rao:
Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Commun. Mag. 51(7): 36-43 (2013) - [c4]Sandra Scott-Hayward, Gemma O'Callaghan, Sakir Sezer:
Sdn Security: A Survey. SDN4FNS 2013: 1-7 - 2012
- [c3]Sandra Scott-Hayward, Emiliano Garcia-Palacios:
A PSO approach to resource allocation in wireless networks. TSP 2012: 151-155 - [c2]Sandra Scott-Hayward, Emiliano Garcia-Palacios:
Is rate-distortion optimization really worth it? WTS 2012: 1-8 - 2011
- [c1]Sandra Scott-Hayward, Emiliano Garcia-Palacios:
High definition video in IEEE 802.15.3c mm-Wave wireless personal area networks. LCN 2011: 93-100
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 02:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint