Exploiting the Vulnerability of Flow Table Overflow in...

Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense

Zhou, Yadong, Chen, Kaiyue, Zhang, Junjie, Leng, Junyuan, Tang, Yazhe
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Volume:
2018
Year:
2018
Language:
english
Journal:
Security and Communication Networks
DOI:
10.1155/2018/4760632
File:
PDF, 2.50 MB
english, 2018
Conversion to is in progress
Conversion to is failed