Login / Signup
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense.
Yadong Zhou
Kaiyue Chen
Junjie Zhang
Junyuan Leng
Yazhe Tang
Published in:
Secur. Commun. Networks (2018)
Keyphrases
</>
probabilistic model
mathematical model
network structure
network model
statistical model
computer networks
evaluation model
buffer overflow
attack graphs
image sequences
objective function
management system
software engineering
test cases
computational model
neural network model