TY - JOUR
T1 - Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network
T2 - Attack Model, Evaluation, and Defense
AU - Zhou, Yadong
AU - Chen, Kaiyue
AU - Zhang, Junjie
AU - Leng, Junyuan
AU - Tang, Yazhe
N1 - Publisher Copyright:
© 2018 Yadong Zhou et al.
PY - 2018
Y1 - 2018
UR - https://www.scopus.com/pages/publications/85042682166
UR - https://www.scopus.com/pages/publications/85042682166#tab=citedBy
U2 - 10.1155/2018/4760632
DO - 10.1155/2018/4760632
M3 - Article
AN - SCOPUS:85042682166
SN - 1939-0114
VL - 2018
JO - Security and Communication Networks
JF - Security and Communication Networks
M1 - 4760632
ER -