TY - JOUR
T1 - Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network
T2 - Attack Model, Evaluation, and Defense
AU - Zhou, Yadong
AU - Chen, Kaiyue
AU - Zhang, Junjie
AU - Leng, Junyuan
AU - Tang, Yazhe
N1 - Publisher Copyright:
© 2018 Yadong Zhou et al.
PY - 2018/1/1
Y1 - 2018/1/1
UR - http://www.scopus.com/inward/record.url?scp=85042682166&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85042682166&partnerID=8YFLogxK
UR - https://corescholar.libraries.wright.edu/cse/529
UR - https://www.hindawi.com/journals/scn/2018/4760632/
U2 - 10.1155/2018/4760632
DO - 10.1155/2018/4760632
M3 - Article
AN - SCOPUS:85042682166
SN - 1939-0114
VL - 2018
JO - Security and Communication Networks
JF - Security and Communication Networks
M1 - 4760632
ER -