共 34 条
[11]
Chiang CYJ, 2016, IEEE MILIT COMMUN C, P800, DOI 10.1109/MILCOM.2016.7795427
[15]
Jafarian Jafar Haadi, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P738, DOI 10.1109/INFOCOM.2015.7218443
[17]
Jafarian JH, 2012, P 1 WORKSH HOT TOP S, P127, DOI DOI 10.1145/2342441.2342467
[18]
What You Need to Know About SDN Flow Tables
[J].
PASSIVE AND ACTIVE MEASUREMENT (PAM 2015),
2015, 8995
:347-359
[19]
Le Malecot E., 2009, Proceedings of the 4th USENIX Workshop on Hot Topics in Security (HotSec'09), P4
[20]
Understanding Divide-Conquer-Scanning Worms
[J].
2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008),
2008,
:51-58