Computation theory

Know your enemy: Stealth configuration-information gathering in SDN

Software Defined Networking (SDN) is a widely-adopted network architecture that provides high flexibility through the separation of the network logic from the forwarding functions. Researchers thoroughly analyzed SDN vulnerabilities and improved its security. However, we believe important security aspects of SDN are still left uninvestigated. In this paper, we raise the concern of the possibility for an attacker to obtain detailed knowledge about an SDN network.

Equivalent-circuit model for stacked slot-based 2D periodic arrays of arbitrary geometry for broadband analysis

The analysis of the transmission and reflection spectra of stacked slot-based 2D periodic structures of arbitrary geometry and the ability to devise and control their electromagnetic responses have been a matter of extensive research for many decades. The purpose of this paper is to develop an equivalent Π circuit model based on the transmission-line theory and Floquet harmonic interactions, for broadband and short longitudinal period analysis.

Scattering from multiple PEC sphere using translation addition theorems for spherical vector wave function

In our manuscript, we are reporting the translation criteria of scattering from Perfect Electric Conductor (PEC) sphere along three-dimensional axes using semianalytical approach.The presented scattering model is based on a generalized Lorenz-Mie theory framework and ensemble with the vector translation Addition Theorem (AT) for the Vector Spherical Harmonics (VSH). Applying extended Mie theory on a sphere leads to a set of an unknown coefficients by the use of translation AT.

© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma