Author:
Wang An,Mohaisen Aziz,Chang Wentao,Chen Songqing
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Reinforcement Learning Model to Adaptive Strategy Determination for Dynamic Defense;2023 6th International Conference on Electronics Technology (ICET);2023-05-12
2. Flow Anomaly Telemetry Driven by Programmable Data Plane;2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics);2021-12
3. Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks;IEEE Transactions on Network and Service Management;2021-03
4. A Lightweight SDN Fingerprint Attack Defense Mechanism Based on Probabilistic Scrambling and Controller Dynamic Scheduling Strategies;Security and Communication Networks;2021-01-25
5. Enhancing Security Management at Software-Defined Exchange Points;IEEE Transactions on Network and Service Management;2019-12