Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense
Release Time:2025-04-30
Hits:
- Date:
- 2025-04-30
- Title of Paper:
- Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense
- Journal:
- Security & Communication Networks
- Summary:
- 安全类文章
- Co-author:
- Zhou Y, Chen K, Zhang J, J Leng, Y Tang
- Translation or Not:
- No
- Date of Publication:
- 2018-01-15




