Login / Signup
Effective Topology Tampering Attacks and Defenses in Software-Defined Networks.
Richard Skowyra
Lei Xu
Guofei Gu
Veer Dedhia
Thomas Hobson
Hamed Okhravi
James Landry
Published in:
DSN (2018)
Keyphrases
</>
computer systems
social networks
user interface
software systems
anomaly detection
complex networks
computer networks
network security
watermarking scheme
small world
fully connected
security risks
denial of service attacks
security vulnerabilities