1. Alberts CJ, Dorofee A (2002) Managing information security risks: the Octave approach. Addison-Wesley Longman Publishing Co., Inc, Boston, MA, USA
2. Alexander I (2003) Misuse cases: use cases with hostile intent. In: IEEE software20.1 (2003), pp 58-66
3. Arbettu RK (2016) Security analysis of OpenDaylight, ONOS, Rosemary and Ryu SDN controllers. In: 2016 17th International telecommunications network strategy and planning symposium (Networks). Sept. 2016, pp 37–44. https://doi.org/10.1109/NETWKS.2016.7751150
4. US-CERT/NIST. CVE-2014-5035 (2014) https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5035 (visited on 01/04/2017)
5. Das A et al (2013) Transparent and flexible network management for BigData processing in the cloud. In: Da Silva D, Porter G (eds) 5th USENIX Workshop on Hot Topics in Cloud Computing, HotCloud’13, San Jose, CA, USA, June 25–26, 2013. USENIX Association, 2013. https://www.usenix.org/conference/hotcloud13/workshop-program/presentations/das. 56 Parvez Ahmad and Sven Jacob and Rahamatullah Khondoker