Sign in

Flow Reconnaissance via Timing Attacks on SDN Switches.

Sheng LiuMichael K. ReiterVyas Sekar
Published in: ICDCS (2017)
Keyphrases
  • flow field
  • countermeasures
  • watermarking scheme
  • database
  • malicious attacks
  • computer security
  • security protocols
  • security threats
  • data sets
  • neural network
  • information security
  • watermarking method