Securing SDN controller and switches from attacks.
Udaya Kiran TupakulaVijay VaradharajanPreeti MishraPublished in: Int. J. High Perform. Comput. Netw. (2019)
Keyphrases
- countermeasures
- control system
- information security
- controller design
- closed loop
- real time
- malicious attacks
- control method
- control algorithm
- neural network
- optimal control
- malicious users
- pid controller
- robust stability
- adaptive control
- nonlinear systems
- security protocols
- denial of service attacks
- security risks
- control theory
- terrorist attacks
- reinforcement learning
- traffic analysis
- security threats
- mobile robot
- security mechanisms
- control strategy
- control law
- watermarking scheme