共 20 条
[1]
[Anonymous], 2010, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, DOI [10.1145/1755688.1755732, DOI 10.1145/1755688.1755732]
[2]
[Anonymous], 2010, OSDI
[3]
Chen KevinZhijie., 2013, NDSS
[5]
SPHINX: Detecting Security Attacks in Software-Defined Networks
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[6]
Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
[7]
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[8]
Kim K, 2012, PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON APAC 2011
[9]
Lee J. K. Jerry, 2014, Proceedings 2014 IEEE International Test Conference (ITC), DOI 10.1109/TEST.2014.7035278
[10]
Logicalis, BYOD RES FIND