Login / Signup
Comparison of SDN Controllers for Constructing Security Functions.
Dobrin Dobrev
Dimiter Avresky
Published in:
NCA (2019)
Keyphrases
</>
information security
security policies
network security
security requirements
access control
intrusion detection
security issues
computer security
control system
key management
real time
artificial intelligence
reinforcement learning
control strategy
functional requirements