Login / Signup
Detecting host location attacks in SDN-based networks.
Sonali Sen Baidya
Rattikorn Hewett
Published in:
WOCC (2020)
Keyphrases
</>
social networks
detecting malicious
computer networks
complex networks
countermeasures
network design
network intrusion detection systems
malicious attacks
network structure
heterogeneous networks
security protocols
network topologies
ip addresses
social ties
malicious activities
detect malicious