On the Security and Vulnerability of PING
暂无分享,去创建一个
[1] Chin-Tser Huang,et al. Hop integrity in computer networks , 2000, Proceedings 2000 International Conference on Network Protocols.
[2] Mohamed G. Gouda. Elements of network protocol design , 1998 .
[3] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[4] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[5] Mohamed G. Gouda. Elements of security: Closure, convergence, and protection , 2001, Inf. Process. Lett..
[6] Anish Arora,et al. Closure and Convergence: A Foundation of Fault-Tolerant Computing , 1993, IEEE Trans. Software Eng..
[7] William Cheswick,et al. Firewalls and Internet Security , 1994 .
[8] Jon Postel,et al. Internet Control Message Protocol , 1981, RFC.