Feffer, 2015
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Furdek et al. | An overview of security challenges in communication networks | |
| Dahan et al. | Security threats and protection procedures for optical networks | |
| US10014933B2 (en) | Transmitting communications traffic across an optical communication network | |
| Medard et al. | Security issues in all-optical networks | |
| Skorin-Kapov et al. | Physical-layer security in evolving optical networks | |
| Rejeb et al. | Fault and attack management in all-optical networks | |
| Bensalem et al. | On detecting and preventing jamming attacks with machine learning in optical networks | |
| Furdek et al. | Physical-layer attacks in all-optical WDM networks | |
| Lazzez | Notice of Violation of IEEE Publication Principles: All-optical networks: Security issues analysis | |
| Rejeb et al. | Multiple attack localization and identification in all-optical networks | |
| EP2141884B1 (en) | Anti-intrusion method and system for a communication network | |
| Feffer | Comprehensive security strategy for all-optical networks | |
| Furdek et al. | Physical-layer attacks in transparent optical networks | |
| Akanksha et al. | A review on Secutity in Internet of Things | |
| Kowalczyk et al. | The Threat of Optical Transmission Jamming | |
| Krishnan et al. | Security issues in all-optical networks | |
| Constantin et al. | Threat classification in current Communication Infrastructures | |
| Patel et al. | Security issues and attack management in AON-A review | |
| Rani et al. | Modeling and exploration of gain competition attacks in optical network-on-chip architectures | |
| Furdek | Physical-layer attacks in optical WDM networks and attack-aware network planning | |
| Khalfallah et al. | Emergency Response Team Framework for Space Systems (ERTFSS) | |
| Kartalopoulos | NIS03-2: Optical Network Security: Sensing Eavesdropper Intervention | |
| Chang et al. | Attacks and detection methods in all-optical networks | |
| Zhao | Attack-Aware Routing and Wavelength Assignment of Scheduled Lightpath Demands | |
| Furdek et al. | Detection of Attacks and Attack-Survivable Routing in Carrier Networks |