Distributed Computing with a Trojan Horse
暂无分享,去创建一个
[1] A. Kohn. [Computer viruses]. , 1989, Harefuah.
[2] M.K.O. Lee. Hacking and computer viruses-the legal dimension , 1990 .
[3] H. Thimbleby,et al. Viruses and their impact on future computing systems , 1990 .
[4] Rens Troost,et al. Communicating Presentation Information in Internet Messages: The Content-Disposition Header , 1995, RFC.
[5] Nathaniel S. Borenstein,et al. Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies , 1996, RFC.
[6] Keith Moore,et al. Communicating Presentation Information in Internet Messages: The Content-Disposition Header Field , 1997, RFC.
[7] Ahmed Patel,et al. Cracking RC5 with Java applets , 1998, Concurr. Pract. Exp..
[8] Jason Maassen,et al. Wire-area parallel computing in Java , 1999, JAVA '99.
[9] Felix C. Freiling,et al. Fundamentals of Fault-Tolerant Distributed Computing in Asynchronous Environments , 1999, ACM Comput. Surv..
[10] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[11] Andrew B. Whinston,et al. Defeating distributed denial of service attacks , 2000 .
[12] Christophe Kalt,et al. Internet Relay Chat: Client Protocol , 2000, RFC.
[13] Christophe Kalt,et al. Internet Relay Chat: Channel Management , 2000, RFC.
[14] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[15] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..