Article,

Vulnerabilities of network control protocols: an example.

.
ACM SIGSOFT Softw. Eng. Notes, 6 (1): 6-8 (1981)

Meta data

Tags

Users

  • @msteele
  • @henkellermann
  • @dblp

Comments and Reviews