"Unmasking SDN flow table saturation: fingerprinting, attacks and defenses."

Beytüllah Yigit et al. (2024)

Details and statistics

DOI: 10.1007/S10207-024-00897-X

access: open

type: Journal Article

metadata version: 2024-12-09