[1]
“DEFENSE AGAINST SOFTWARE-DEFINED NETWORK TOPOLOGY POISONING ATTACKS”, IJESR, vol. 14, no. 2, pp. 514–523, Apr. 2024, Accessed: Mar. 14, 2026. [Online]. Available: https://ijesr.org/index.php/ijesr/article/view/732