2022
DOI: 10.1080/19393555.2022.2111004
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 84 publications
0
3
0
Order By: Relevance
“…π‘Ÿ 𝑖,𝑗 denotes random numbers within the range [0,1] and 𝐼 𝑖,𝑗 signifies random numbers selected from the set {1,2}. If the newly calculated position results in an enhancement in the objective function value, it is considered valid according to Equation (10).…”
Section: Feature Selectionmentioning
confidence: 99%
See 2 more Smart Citations
“…π‘Ÿ 𝑖,𝑗 denotes random numbers within the range [0,1] and 𝐼 𝑖,𝑗 signifies random numbers selected from the set {1,2}. If the newly calculated position results in an enhancement in the objective function value, it is considered valid according to Equation (10).…”
Section: Feature Selectionmentioning
confidence: 99%
“…During this stage, the Siberian tiger shifts its position while attacking its prey, improving the algorithm's capability for local search and exploitation to achieve superior solutions. Initially, a new position for the Siberian tiger near the attack site is calculated using Equation (10) This creature engages in fights with brown and black bears, driven by differences in prey preferences and survival instincts. Consequently, in the second stage, STO members undergo updates to simulate the strategic behavior of Siberian tigers when confronting bears.…”
Section: Feature Selectionmentioning
confidence: 99%
See 1 more Smart Citation