阅读笔记|Verifying and Monitoring IoTs Network Behavior Using MUD Profiles

info: A. Hamza, D. Ranathunga, H. H. Gharakheili, T. A. Benson, M. Roughan, and V. Sivaraman, “Verifying and Monitoring IoTs Network Behavior Using MUD Profiles,” IEEE Trans. Dependable and Secure Comput., vol. 19, no. 1, pp. 1–18, Jan. 2022, doi: 10.1109/TDSC.2020.2997898.

阅读笔记|Demystifying configuration challenges and trade-offs in network-based ISP services

info: T. Benson, A. Akella, and A. Shaikh, “Demystifying configuration challenges and trade-offs in network-based ISP services,” in Proceedings of the ACM SIGCOMM 2011 conference, Toronto Ontario Canada: ACM, Aug. 2011, pp. 302–313. doi: 10.1145/2018436.2018471.

阅读笔记|The evolution of network configuration: a tale of two campuses

info: H. Kim, T. Benson, A. Akella, and N. Feamster, “The evolution of network configuration: a tale of two campuses,” in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, Berlin Germany: ACM, Nov. 2011, pp. 499–514. doi: 10.1145/2068816.2068863.