Author:
Sen Sajib,Gupta Kishor Datta,Manjurul Ahsan Md.
Reference20 articles.
1. Eskca EB, Abuzaghleh O, Bondugula S, Joshi P, Nakayama T, Sultana A (2015) Software defined networks security: an analysis of issues and solutions. Int J Sci Eng Res 6:1270–1275
2. Ashraf J, Latif S ( 2014) Handling intrusion and DDoS attacks in software defined networks using machine learning techniques. In: Software engineering conference (NSEC), pp 55–60
3. Abdou A, Barrera D, van Oorschot PC (2016) What lies beneath? analyzing automated SSH bruteforce attacks. In: International conference on PASSWORDS 2015: technology and practice of passwords, pp 72–91
4. Qazi ZA, Jin T, Lee J, Bellala G, Arndt M, Noubir G (2013) Application awareness in SDN. ACM SIGCOMM Comput Commun Rev 43:487–488
5. Gupta KD, Sen S (2018) A genetic algorithm approach to regenerate image from a reduce scaled image using bit data count. BRAIN. Broad Res Artif Intell Neurosci 9:34–44
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献