1. Distributed and collaborative traffic monitoring in software defined networks;Yu,2014
2. An adaptive flow counting method for anomaly detection in SDN;Zhang,2013
3. Cuckoo hashing;Pagh;J. Algorithms,2004
4. Peacock hashing: deterministic and updatable hashing for high performance networking;Kumar,2008
5. Vulnerability of network mechanisms to sophisticated DDos attacks;Ben-Porat;IEEE Trans. Comput.,2013