1. Towards an sdn network control application for differentiated traffic routing;Adami,2015
2. Performance analysis of pox and ryu with different sdn topologies;Ali,2018
3. Identifying encrypted malware traffic with contextual flow data;Anderson,2016
4. Identifying encrypted malware traffic with contextual flow data;Anderson,2016
5. Anon,, https://github.com/faizann24/Using-machine-learning-to-detectmalicious-URLs (accessed 21 2018).