Towards Validation of the Internet Census 2012
暂无分享,去创建一个
Anna Sperotto | Pieter-Tjerk de Boer | José Jair Santanna | Dirk Maan | P. Boer | A. Sperotto | J. J. Santanna | Dirk Maan
[1] Eric Wustrow,et al. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices , 2012, USENIX Security Symposium.
[2] Ramesh Govindan,et al. Census and survey of the visible internet , 2008, IMC '08.
[3] Georg Carle,et al. The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements , 2011, IMC '11.
[4] Conclusions , 1989 .
[5] Antonio Pescapè,et al. Analysis of a "/0" stealth scan from a botnet , 2015, TNET.
[6] Eric Wustrow,et al. ZMap: Fast Internet-wide Scanning and Its Security Applications , 2013, USENIX Security Symposium.