Using Long-Short-Term Memory to Effectively Identify Persistent Routes Under Stealthy Link Flooding Attacks in Software-Defined Networks.
Wenjie YuBoyang ZhouPublished in: ISCC (2023)
Keyphrases
- software systems
- software architecture
- computer systems
- recurrent neural networks
- long short term memory
- source code
- social networks
- user interface
- software development
- neighboring nodes
- countermeasures
- network structure
- security risks
- computer networks
- machine learning
- information security
- route planning
- wireless ad hoc networks
- neural network
- intrusion detection