Login / Signup
Flow Reconnaissance via Timing Attacks on SDN Switches.
Sheng Liu
Michael K. Reiter
Vyas Sekar
Published in:
ICDCS (2017)
Keyphrases
</>
flow field
countermeasures
watermarking scheme
database
malicious attacks
computer security
security protocols
security threats
data sets
neural network
information security
watermarking method