共 34 条
- [11] Chiang CYJ, 2016, IEEE MILIT COMMUN C, P800, DOI 10.1109/MILCOM.2016.7795427
- [15] Jafarian Jafar Haadi, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P738, DOI 10.1109/INFOCOM.2015.7218443
- [17] Jafarian JH, 2012, P 1 WORKSH HOT TOP S, P127, DOI DOI 10.1145/2342441.2342467
- [18] What You Need to Know About SDN Flow Tables [J]. PASSIVE AND ACTIVE MEASUREMENT (PAM 2015), 2015, 8995 : 347 - 359
- [19] Le Malecot E., 2009, Proceedings of the 4th USENIX Workshop on Hot Topics in Security (HotSec'09), P4
- [20] Understanding Divide-Conquer-Scanning Worms [J]. 2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 51 - 58