has been cited by the following article(s):
[1]
|
Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI, and MTD Approaches to Security Solutions
IEEE Access,
2024
DOI:10.1109/ACCESS.2024.3393548
|
|
|
[2]
|
Federated learning optimization: A computational blockchain process with offloading analysis to enhance security
Egyptian Informatics Journal,
2023
DOI:10.1016/j.eij.2023.100406
|
|
|
[3]
|
Lightweight Challenge-Response Authentication in SDN-Based UAVs Using Elliptic Curve Cryptography
Electronics,
2022
DOI:10.3390/electronics11071026
|
|
|
[4]
|
Lightweight Challenge-Response Authentication in SDN-Based UAVs Using Elliptic Curve Cryptography
Electronics,
2022
DOI:10.3390/electronics11071026
|
|
|