[1] |
Wu Qiang, Yu Chong-xiu, Xin Xiang-jun, et al. Research of crosstalk in cascade system of OXC and OADM [J]. Acta Photonica Sinica, 2002, 31(4): 421-424 (in Chinese).
|
[2] |
Jirattigalachote A, Skorin-Kapov N, Furdek M, et al. Sparse power equalization placement for limiting jamming attack propagation in transparent optical networks [J]. Optical Switching and Networking,2011, 8(4): 249-258.
|
[3] |
Furdek M. Physical-layer attacks in optical WDM networks and attack-aware network planning [J]. European Journal of Operational Research, 2011, 178(2):1160-1167.
|
[4] |
Wu T, Somani A K. Cross-talk attack monitoring and localization in all-optical networks [J]. IEEE/ACM Transactions on Networking, 2006, 13(6): 1390-1401.
|
[5] |
Zhao Zi-sen. Past, present and future of optical fiber communications [J]. Acta Photonica Sinica, 2011,31(9): 0900109 (in Chinese).
|
[6] |
Castanon G, Razo-Zapata I, Ramirez-Velarde C M R, et al. Security in all-optical networks: Failure and attack avoidance using self-organization [C] //Proceedings of 2nd International Conference on Transparent Optical Networks (ICTON). [s.l.]: IEEE, 2008: 1-5.
|
[7] |
Medard M, Marquis D, Barry R A, et al. Security issues in all-optical networks [J]. IEEE Network, 1997,11(3): 42-48.
|
[8] |
Sharma N. Effects of crosstalk propagation on the performance of all-optical networks [C]// Proceedings of 1st International Conference on Recent Advances in Information Technology. [s.l.]: IEEE, 2012: 240-245.
|
[9] |
Peng Y F, Sun Z Y, Du S, et al. Propagation of alloptical crosstalk attack in transparent optical networks[J]. Optical Engineering, 2011, 50(8): 085002.
|
[10] |
Skorin-Kapov N, Chen J J, Wosinska L. A new approach to optical networks security: Attack-aware routing and wavelength assignment [J]. IEEE/ACM Transactions on Networking, 2010, 18(3): 750-760.
|
[11] |
Furdek M, Skorin-Kapov N, Tzanakaki A. Survivable routing and wavelength assignment considering high-powered jamming attacks [C] // Proceedings of SPIE-OSA-IEEE Asia Communications and Photonics.[s.l.]: IEEE, 2011: 83101H.
|
[12] |
Furdek M, Skorin-Kapov N. Attack-survivable routing and wavelength assignment for high-power jamming [C]// Proceedings of 17th International Conference on Optical Network Design and Modeling. [s.l.]:IEEE, 2013: 70-75, .
|
[13] |
Rejeb R, Leeson M S, Green R J. Fault and attack management in all-optical networks [J]. IEEE Communications Magazine, 2006, 44(11): 79-86.
|
[14] |
Jedidi A, Abid M. Performance monitoring method for all-optical networks [C]// Proceedings of International Conference on Networking and Digital Society.[s.l.]: IEEE, 2009: 57-62.
|
[15] |
Bergman R, Medard M, Chan S. Distributed algorithms for attack localization in all-optical networks [C] // the 5th Annual Symposium on Network and Distributed System Security Symposium. [s.l.]: Internet Society (ISOC), 1998: 1-17.
|
[16] |
Liu Yu, Sun Ya-ni, Fang Li-jie, et al. Analysis of stimulated Raman scattering effects on DWDM optical communication systems [J]. Study on Optical Communications,2010 (157):1-4 (in Chinese).
|
[17] |
Shen Ting-gen, He Qin, Tan Xi-lin, et al. Analyze of non-linear effect and crosstalk in the DWDM System[J]. Laser Journal, 2002, 23(5): 42-47 (in Chinese).
|