共 32 条
[1]
Al-Shaer E., 2010, P 3 ACM WORKSHOP ASS, P37, DOI DOI 10.1145/1866898.1866905
[2]
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[3]
Antikainen Markku, 2014, Secure IT Systems 19th Nordic Conference, NordSec 2014. Proceedings: LNCS 8788, P229, DOI 10.1007/978-3-319-11599-3_14
[5]
Chi PW, 2015, 2015 1st IEEE Conference on Network Softwarization (NetSoft)
[6]
SPHINX: Detecting Security Attacks in Software-Defined Networks
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[7]
Distributed Audit System of SDN Controller Based on Blockchain
[J].
SMART BLOCKCHAIN, SMARTBLOCK 2019,
2019, 11911
:21-31
[8]
Hong S, 2015, INT CONF BIG DATA, P87, DOI 10.1109/35021BIGCOMP.2015.7072816