Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environments.
Victor T. da CostaLuís Henrique Maciel Kosmalski CostaPublished in: J. Internet Serv. Appl. (2015)
Keyphrases
- buffer overflow
- network model
- attack graphs
- communication networks
- limited budget
- attack graph
- network structure
- optimal solution
- computer networks
- peer to peer
- wireless sensor networks
- real time
- network traffic
- complex networks
- feasible solution
- virtual world
- benchmark problems
- virtual environment
- countermeasures
- network monitoring
- response time
- mobile sensor