[HTML][HTML] A DDoS attack mitigation scheme in ISP networks using machine learning based on SDN

NN Tuan, PH Hung, ND Nghia, NV Tho, TV Phan… - Electronics, 2020 - mdpi.com
Keeping Internet users protected from cyberattacks and other threats is one of the most
prominent security challenges for network operators nowadays. Among other critical threats …

[引用][C] A DDoS Attack Mitigation Scheme in ISP Networks Using Machine Learning Based on SDN

NN Tuan, PH Hung, ND Nghia, NV Tho, TV Phan… - Electronics …, 2020 - jglobal.jst.go.jp
A DDoS Attack Mitigation Scheme in ISP Networks Using Machine Learning Based on SDN
| Article Information | J-GLOBAL Art J-GLOBAL ID:202102282566730545 Reference number:21A0992965 …

A DDoS Attack Mitigation Scheme in ISP Networks Using Machine Learning Based on SDN†.

NN Tuan, PH Hung, ND Nghia, NV Tho… - Electronics (2079 …, 2020 - search.ebscohost.com
Keeping Internet users protected from cyberattacks and other threats is one of the most
prominent security challenges for network operators nowadays. Among other critical threats …

[PDF][PDF] A DDoS Attack Mitigation Scheme in ISP Networks Using Machine Learning Based on SDN

NN Tuan, PH Hung, ND Nghia, N Van Tho, T Van Phan… - pdfs.semanticscholar.org
Keeping Internet users protected from cyberattacks and other threats is one of the most
prominent security challenges for network operators nowadays. Among other critical threats …

[PDF][PDF] A DDoS Attack Mitigation Scheme in ISP Networks Using Machine Learning Based on SDN

NN Tuan, PH Hung, ND Nghia, N Van Tho, T Van Phan… - academia.edu
Keeping Internet users protected from cyberattacks and other threats is one of the most
prominent security challenges for network operators nowadays. Among other critical threats …

[PDF][PDF] A DDoS Attack Mitigation Scheme in ISP Networks Using Machine Learning Based on SDN

NN Tuan, PH Hung, ND Nghia, N Van Tho, T Van Phan… - academia.edu
Keeping Internet users protected from cyberattacks and other threats is one of the most
prominent security challenges for network operators nowadays. Among other critical threats …