Toward Vulnerability Assessment for 5G Mobile Communication Networks
暂无分享,去创建一个
Jianhua Li | Jun Wu | Longhua Guo | Shibo Luo | Bei Pei | Jun Wu | Shibo Luo | Jianhua Li | Longhua Guo | Bei Pei
[1] T. Saaty,et al. The Analytic Hierarchy Process , 1985 .
[2] Ching-Lai Hwang,et al. Fuzzy Multiple Attribute Decision Making - Methods and Applications , 1992, Lecture Notes in Economics and Mathematical Systems.
[3] Jianhua Li,et al. Building network attack graph for alert causal correlation , 2008, Comput. Secur..
[4] Sakir Sezer,et al. Sdn Security: A Survey , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).
[5] Yan Wang,et al. Mobileflow: Toward software-defined mobile networks , 2013, IEEE Communications Magazine.
[6] Igor Radusinovic,et al. SDN Based Mobile Networks: Concepts and Benefits , 2014, Wireless Personal Communications.
[7] Yonggang Wen,et al. “ A Survey of Software Defined Networking , 2020 .
[8] Jim Esch,et al. Software-Defined Networking: A Comprehensive Survey , 2015, Proc. IEEE.