搜索筛选:
搜索耗时4.3349秒,为你在为你在102,285,761篇论文里面共找到 10 篇相符的论文内容
类      型:
[期刊论文] 作者:Hongchang Chen,Guozhen Cheng,Z, 来源:中国通信 年份:2016
Elastic control could balance the distributed control plane in Software-Defined Networking(SDN). Dynamic switch migration has been proposed to achieve it. Howev...
[期刊论文] 作者:Guozhen Cheng,Hongchang Chen,H, 来源:中国通信:英文版 年份:2017
Dynamic Controller Provisioning Problem(DCPP) is a key problem for scalable SDN. Previously, the solution to this problem focused on adapting the number of cont...
[期刊论文] 作者:Hongchang Chen,Guozhen Cheng,Zhiming Wang,, 来源:中国通信 年份:2016
Elastic control could balance the distributed control plane in Software-Defined Networking(SDN). Dynamic switch migration has been proposed to achieve it. Howev...
[期刊论文] 作者:Zhenpeng Wang,Hongchao Hu,Guozhen Cheng, 来源:中国通信(英文版) 年份:2019
The Domain Name System (DNS) is suffering from the vulnerabilities exploited to launch the cache poisoning attack. Inspired by biodiversity, we design and imple...
[期刊论文] 作者:Guozhen Cheng,Hongchang Chen,Hongchao Hu,Zhiming Wang,, 来源:中国通信 年份:2017
Dynamic Controller Provisioning Problem(DCPP) is a key problem for scalable SDN. Previously, the solution to this problem focused on adapting the number of cont...
[期刊论文] 作者:Hongchao Hu,Lin Pang,Zhenpeng Wang,Guozhen Cheng,, 来源:中国通信 年份:2017
Software.defined networking(SDN) enables third.part companies to participate in the network function innovations. A number of instances for one network function...
[期刊论文] 作者:Jianjian Ai,Zehua Guo,Hongchang Chen,Guozhen Cheng, 来源:中国通信(英文版) 年份:2019
Nowadays network virtualization is utterly popular.As a result,how to protect the virtual networks from attacking on the link is increasingly important.Existing...
[期刊论文] 作者:Zhenping Lu,Fucai Chen,Guozhen Cheng,Chao Qi,Jianjian Ai,, 来源:中国通信 年份:2017
Controller vulnerabilities allow malicious actors to disrupt or hijack the Software-Defined Networking. Traditionally, it is static mappings between the control...
[期刊论文] 作者:Chao Qi,Jiangxing Wu,Guozhen Cheng,Jianjian Ai,Shuo Zhao,, 来源:中国通信 年份:2017
Current SDN controllers suffer from a series of potential attacks. For example, malicious flow rules may lead to system disorder by introducing unexpected flow...
[期刊论文] 作者:Dacheng Zhou,Hongchang Chen,Guozhen Cheng,Weizhen He,Lingshu Li, 来源:中国通信:英文版 年份:2021
Based on the diversified technology and the cross-validation mechanism,the N-variant system provides a secure service architecture for cloud providers to protect the cloud applications from attacks by executing multiple variants of a single......
相关搜索: