<--- Back to Details
First PageDocument Content
System software / Computing / Utility software / Computer network security / Computer security / Configuration management / Network architecture / Software-defined networking / Intrusion detection system / Snort / OpenFlow / Traffic flow
Date: 2017-05-14 15:46:40
System software
Computing
Utility software
Computer network security
Computer security
Configuration management
Network architecture
Software-defined networking
Intrusion detection system
Snort
OpenFlow
Traffic flow

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 462,36 KB

Share Document on Facebook

Similar Documents

Exclusive Report on Software Configuration Management  The Case for Better Software Configuration Management and Agile Processes  An Exclusive Research Report

Exclusive Report on Software Configuration Management The Case for Better Software Configuration Management and Agile Processes An Exclusive Research Report

DocID: 1uTua - View Document

CertAgent® Installation, Configuration, and Management Guide VersionDecember 12, 2013

CertAgent® Installation, Configuration, and Management Guide VersionDecember 12, 2013

DocID: 1uQE4 - View Document

Use of a Software Configuration Management Tool in LHCb J.Harvey1 P.Mato1 F.Ranjard 1 European Laboratory for Particle Physics (CERN), Gen`eve, Switzerland Abstract LHCb Software is made up of a variety of software packa

Use of a Software Configuration Management Tool in LHCb J.Harvey1 P.Mato1 F.Ranjard 1 European Laboratory for Particle Physics (CERN), Gen`eve, Switzerland Abstract LHCb Software is made up of a variety of software packa

DocID: 1ur31 - View Document

Cost Saving Potentials by Applying Configuration Management Applying together withby NATO / OTAN

Cost Saving Potentials by Applying Configuration Management Applying together withby NATO / OTAN

DocID: 1uq5K - View Document

MIKE ST. CLAIR  Technical Background Installation, Configuration and Management of: •

MIKE ST. CLAIR Technical Background Installation, Configuration and Management of: •

DocID: 1uh5X - View Document