共 19 条
- [1] Chen Yue, 2013, Journal on Communications, V34, P171, DOI 10.3969/j.issn.1000-436x.2013.01.019
- [2] SPHINX: Detecting Security Attacks in Software-Defined Networks [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [3] Dong Ping, 2007, Acta Electronica Sinica, V35, P599
- [4] FARINACCI D, 2011, LOCATOR ID SEPARATIO
- [5] Guang Yao, 2011, 2011 19th IEEE International Conference on Network Protocols, P7, DOI 10.1109/ICNP.2011.6089085
- [6] KIM H, 2014, ACM C SIGCOMM CHIC U, P271
- [7] Li D, 2014, IEEE INFOCOM SER, P1743, DOI 10.1109/INFOCOM.2014.6848112
- [8] [李杰 Li Jie], 2012, [计算机学报, Chinese Journal of Computers], V35, P85
- [9] Source Address Validation in Software Defined Networks [J]. PROCEEDINGS OF THE 2016 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION (SIGCOMM '16), 2016, : 595 - 596