Search

Showing total 4 results
4 results

Search Results

1. Fine-granularity inference and estimations to network traffic for SDN.

2. A decoy chain deployment method based on SDN and NFV against penetration attack.

3. A multi-domain trust management model for supporting RFID applications of IoT.

4. Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks.