Login / Signup
Setting Malicious Flow Entries Against SDN Operations: Attacks and Countermeasures.
Cheng-Hsu Lin
Chi-Yu Li
Kuochen Wang
Published in:
DSC (2018)
Keyphrases
</>
countermeasures
information security
power analysis
java card
rural areas
cyber attacks
detect malicious
security measures
malicious users
security breaches
differential power analysis
database
defense mechanisms
detecting malicious
malicious behavior
smart card
information systems
data mining