Inproceedings,

The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems.

, , , and .
SecureComm, volume 19 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 448-458. Springer, (2009)

Meta data

Tags

Users

  • @dblp

Comments and Reviews