Login / Signup

Utilizing attack enumerations to study SDN/NFV vulnerabilities.

Quang-Vinh DangJérôme François
Published in: NetSoft (2018)
Keyphrases
  • theoretical framework
  • countermeasures
  • neural network
  • information retrieval
  • empirical studies
  • simulation study