Author of the publication

基于OpenFlow的SDN网络攻防方法综述 (Survey for Attack and Defense Approaches of OpenFlow-enabled Software Defined Network).

, , and . 计算机科学, 44 (6): 121-132 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Systematic Treat Model for Software-Defined Networking., , , and . KSII Trans. Internet Inf. Syst., 15 (2): 580-599 (2021)Decrypted data detection algorithm based on dynamic dataflow analysis., , , and . CITS, page 1-4. IEEE, (2014)基于OpenFlow的SDN网络攻防方法综述 (Survey for Attack and Defense Approaches of OpenFlow-enabled Software Defined Network)., , and . 计算机科学, 44 (6): 121-132 (2017)An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture., , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 150 (2021)ER-Fuzz:Conditional Code Removed Fuzzing., , , and . KSII Trans. Internet Inf. Syst., 13 (7): 3511-3532 (2019)DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment., , , , and . ICPADS, page 675-682. IEEE, (2023)A Third-Order CIFF Noise-Shaping SAR ADC with Nonbinary Split-Capacitor DAC., , , and . APCCAS, page 162-165. IEEE, (2022)A comprehensive survey of vulnerability detection method towards Linux-based IoT devices., , , and . CNCIT, page 35-41. ACM, (2023)An Improved Offline Symbolic Execution Approach., , and . CSAI/ICIMT, page 314-320. ACM, (2018)An OpenFlow User-Switch Remapping Approach for DDoS Defense., , , and . KSII Trans. Internet Inf. Syst., 10 (9): 4529-4548 (2016)