Author:
Soussi Wissem,Christopoulou Maria,Xilouris George,Gur Gurkan
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Subject
Management of Technology and Innovation,Law,Computer Networks and Communications,Safety, Risk, Reliability and Quality
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Unmasking SDN flow table saturation: fingerprinting, attacks and defenses;International Journal of Information Security;2024-08-04
2. Moving target defense approach for secure relay selection in vehicular networks;Vehicular Communications;2024-06
3. RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT;IEEE Transactions on Information Forensics and Security;2024
4. MERLINS – Moving Target Defense Enhanced with Deep-RL for NFV In-Depth Security;2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN);2023-11-07
5. Attacks Against Mobility Prediction in 5G Networks;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01