[1] Hu, Q. Hao and K. Bao, "A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation," in IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 2181-2206, Fourthquarter 2014, doi: 10.1109/COMST.2014.2326417.
[2] Abdelouahid Derhab, Mohamed Guerroumi, Mohamed Belaoued, Omar Cheikhrouhou, "BMC-SDN: Blockchain-Based Multicontroller Architecture for Secure Software-Defined Networks", Wireless Communications and Mobile Computing, vol. 2021, Article ID 9984666, 12 pages, 2021. https://doi.org/10.1155/2021/9984666.
[3] J. Soares et al., "Toward a telco cloud environment for service functions," in IEEE Communications Magazine, vol. 53, no. 2, pp. 98-106, Feb. 2015, doi: 10.1109/MCOM.2015.7045397.
[4] X. Zhiqun, C. Duan, H. Zhiyuan and S. Qunying, "Emerging of Telco Cloud," in China Communications, vol. 10, no. 6, pp. 79-85, June 2013, doi: 10.1109/CC.2013.6549261.
[5] 2021, https://www.sdxcentral.com/sdn/definitions/what-is-openflow/.
[6] M. Imran, M. H. Durad, F. A. Khan, and A. Derhab, "Toward an optimal solution against denial of service attacks in software defined networks," Future Generation Computer Systems, vol. 92, pp. 444–453, 2019.
[7] Mishra, Shailendra & Alshehri, Mohammed. (2017). Software Defined Networking: Research Issues, Challenges and Opportunities. Indian Journal of Science and Technology. 10. 1-9. 10.17485/ijst/2017/v10i29/112447.
[8] Raphael Horvath, Dietmar Nedbal, Mark Stieninger,A Literature Review on Challenges and Effects of Software Defined Networking,Procedia Computer Science Volume 64,2015,Pages 552-561,ISSN 18770509,https://doi.org/10.1016/j.procs.2015.08.563(https://www.sciencedirect.com/science/article/pii/S1877050915026988)
[9] arXiv:1905.04649v1 [cs.NI]
[10] Faridullah Amarkhil , Prashansa Taneja, 2020, A Research Paper of Security Enforcement Policy for (SDN) (WLAN) Software Defined Network, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT.) Volume 09, Issue 06 (June 2020)
[11] Papavassiliou, Symeon. 2020. "Software Defined Networking (SDN) and Network Function Virtualization (NFV)" Future Internet 12, no. 1: 7. https://doi.org/10.3390/fi12010007
[12] Bermbach, David & Pallas, Frank & Pérez, David & Plebani, Pierluigi & Anderson, Maya & Kat, Ronen & Tai, Stefan. (2017). A Research Perspective on Fog Computing.
[13] https://www.gartner.com/doc/2963217/rightsizing-data-center-network-
[14] Rahman, Gohar & Chuah, Chai Wen. (2018). Fog Computing, Applications, Security and Challenges, Review. International Journal of Engineering & Technology. 7. 1615. 10.14419/ijet.v7i3.12612.
[15] https://www.a10networks.com/blog/5-most-famous-ddos-attacks/
[16] https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html
[17] Sayeed, S.; Marco-Gisbert, H. Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack. Appl. Sci. 2019, 9, 1788. https://doi.org/10.3390/app9091788 AMA Style
[18] Dokoumetzidis, A., Iliadis, A. & Macheras, P. Nonlinear Dynamics and Chaos Theory: Concepts and Applications Relevant to Pharmacodynamics. Pharm Res 18, 415–42(2001).https://doi.org/10.1023/A:1011083723190
[19] Cetinkaya, A.; Ishii, H.; Hayakawa, T. An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses. Entropy 2019, 21, 210. https://doi.org/10.3390/e21020210
[20] Andria Procopiou, Nikos Komninos, Christos Douligeris, "ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos Theory in Smart Home IoT Network", Wireless Communications and Mobile Computing, vol. 2019, Article ID 8469410, 14 pages, 2019. https://doi.org/10.1155/2019/8469410
[21] Chen, Jianwen & Duan, Kai & Zhang, Rumin & Zeng, Liaoyuan & Wang, Wenyi. (2018). An AI Based Super Nodes Selection Algorithm in BlockChain Networks.
[22] Chonka, Ashley & Singh, Jaipal & Zhou, Wanlei. (2009). Chaos theory based detection against network mimicking DDoS attacks. Communications Letters, IEEE. 13. 717 - 719. 10.1109/LCOMM.2009.090615.
[23] S. Boukria, M. Guerroumi and I. Romdhani, "BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN," 2019 IEEE Symposium on Computers and Communications (ISCC), 2019, pp. 1034-1039, doi: 10.1109/ISCC47284.2019.8969780.
[24] Wenjuan, LI., Weizhi, M., Zhiqiang, L., & Man-Ho, A. (2020). Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions. IEICE Transactions on Information and Systems, E103.D(2), 196-203. https://doi.org/10.1587/transinf.2019ini0002
[25] Yazdinejad, R. Parizi, A. Dehghantanha, Q. Zhang and K. Choo, "An Energy-Efficient S.D.N. Controller Architecture for IoT Networks With Blockchain-Based Security" in IEEE Transactions on Services Computing, vol. 13, no. 04, pp. 625-638, 2020. doi: 10.1109/T.S.C.2020.2966970 keywords: {blockchain;computer architecture;energy consumption;routing protocols;internet of things;authentication} url: https://doi.ieeecomputersociety.org/10.1109/TSC.2020.2966970
[26] Theviyanthan Krishnamohan, Kugathasan Janarthanan, Peramune PRLC, Ranaweera A.T (2020); BlockFlow: A decentralized SDN controller using Blockchain; International Journal of Scientific and Research Publications (IJSRP) 10(03) (ISSN: 2250-3153), DOI: http://dx.doi.org/10.29322/IJSRP.10.03.2020.p999
[27] C. Tselios, I. Politis and S. Kotsopoulos, "Enhancing SDN security for IoT-related deployments through blockchain," 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2017, pp. 303-308, doi: 10.1109/NFV-SDN.2017.8169860.
[28] K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba,A. Miller, P. Saxena, E. Shi, E. G. Sirer, D. Song, and R. Wattenhofer, "On scaling decentralized blockchains," in Proc. Int. Conf. FinancialCryptogr. Data Secur. Berlin, Germany: Springer, 2016, pp. 106–125.
[29] Fan, Stephen & Ghaemi, Sara & Khazaei, Hamzeh & Musilek, Petr. (2020). Performance Evaluation of Blockchain Systems: A Systematic Survey. IEEE Access. PP. 1-1. 10.1109/ACCESS.2020.3006078.
[30] https://www.f5.com/labs/articles/threat-intelligence/ddos-attack-trends-for-2020
[31] https://www.pwc.com/gx/en/industries/technology/blockchain/blockchain-in-business.html
[32] AUTHOR=Leible Stephan, Schlager Steffen, Schubotz Moritz, Gipp Bela TITLE=A Review on Blockchain Technology and Blockchain Projects Fostering Open Science JOURNAL=Frontiers in Blockchain VOLUME=2 YEAR=2019 PAGES=16 URL=https://www.frontiersin.org/article/10.3389/fbloc.2019.00016 DOI=10.3389/fbloc.2019.00016 ISSN=2624-7852
[33] Makridakis, Spyros & Christodoulou, Klitos. (2019). Blockchain: Current Challenges and Future Prospects/Applications. Future Internet. 11. 258. 10.3390/fi11120258.
[34] https://platformvaluenow.org/signals/problems-with-blockchain/
[35] Meva, Dr. Divyakant. (2018). Issues and Challenges with Blockchain: A Survey. INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING. 6. 488-491. 10.26438/ijcse/v6i12.488491.
[36] https://blog.holochain.org/satoshi-nakamoto-and-the-fate-of-our-planet-2/
[37] https://assets.ctfassets.net/sdlntm3tthp6/3h8Kkl1fEkk2KEMKiQQ2eC/d88343ceab28a70b0f121fc9c032b208/holochain__1_.pdf
[38] Sayeed, Sarwar & Marco-Gisbert, Hector. (2019). Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack. Applied Sciences. 9. 1788. 10.3390/app9091788.
[39] Vitalik Buterin. Selfish Mining: A 25% Attack Against the Bitcoin Network. 2013. Available online: https://bitcoinmagazine.com/articles/selfish-mining-a-25-attack-against-the-bitcoin-network/1383578440/
[40] IOTA. What Is IOTA? 2018. Available online: https://www.iota.org/get-started/what-is-iota
[41] Daniel Barta. IOTA: The Currency of Skynet. 2018. Available online: https://hackernoon.com/iota-the currency-of-skynet-281b6abaec5
[42] Bitcoin.com. What Is Bitcoin Double-Spending? 2017. Available online: https://www.bitcoin.com/info/what-is-bitcoin-double-spending
[43] Jon Matonis. The Bitcoin Mining Arms Race: GHash.io and the 51% Issue. 2017. Available online:https://www.coindesk.com/bitcoin-mining-detente-ghash-io-51-issue
[44] Blockchain. Hash Distribution. 2019. Available online: https://www.blockchain.com/pools?timespan=24hours
[45] Alberto Garoffolo, Pier Stabilini, Robert Viglione and Uri Stav. A Penalty System for Delayed Block Submission. 2018. Available online: https://www.horizen.global/assets/files/A-Penalty-System-forDelayed-Block-Submission-by-Horizen.pdf
[46] Bonomi, Flavio (June 4–8, 2011). "Cloud and Fog Computing: Trade-offs and Applications. EON-2011 Workshop, International Symposium on Computer Architecture (ISCA 2011), San Jose, CA, USA". sites.google.com. Retrieved 2019-08-07.
[47] Janakiram, MSV (18 April 2016). "Is Fog Computing the Next Big Thing in the Internet of Things". Forbes Magazine. Retrieved 18 April 2016.
[48] Brogi, Antonio; Forti, Stefano (2017). "QoS-aware Deployment of IoT Applications Through the Fog" (PDF). IEEE Internet of Things Journal. PP (99): 1185–1192. doi:10.1109/JIOT.2017.2701408. ISSN 2327-4662. S2CID 2880664.
[49] Nikoloudakis, Y.; Panagiotakis, S.; Markakis, E.; Pallis, E.; Mastorakis, G.; Mavromoustakis, C. X.; Dobre, C. (November 2016). "A Fog-Based Emergency System for Smart Enhanced Living Environments". IEEE Cloud Computing. 3 (6): 54–62. doi:10.1109/mcc.2016.118. ISSN 2325-6095. S2CID 25475572
[50] Sarkar, S.; Chatterjee, S.; Misra, S. (2018). "Assessment of the Suitability of Fog Computing in the Context of Internet of Things". IEEE Transactions on Cloud Computing. 6 (1): 46–59. doi:10.1109/TCC.2015.2485206. ISSN 2168-7161. S2CID 3823420.
[51] https://en.wikipedia.org/wiki/Fog_computing