![](/img/cover-not-exists.png)
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense
Zhou, Yadong, Chen, Kaiyue, Zhang, Junjie, Leng, Junyuan, Tang, YazheVolume:
2018
Year:
2018
Language:
english
Journal:
Security and Communication Networks
DOI:
10.1155/2018/4760632
File:
PDF, 2.50 MB
english, 2018