Robust SDN controller placement to malicious node attacks.
Dorabella SantosAmaro de SousaCarmen Mas MachucaPublished in: ICIN (2018)
Keyphrases
- malicious attacks
- malicious behavior
- control algorithm
- malicious users
- robust stability
- malicious nodes
- semi fragile watermarking
- detect malicious
- control system
- image watermarking
- real time
- traffic analysis
- digital image watermarking
- malicious code
- watermarking technique
- countermeasures
- formal specification
- tree structure
- neural network