Covert Distributed Computing Using Java Through Web Spoofing
暂无分享,去创建一个
[1] Gary McGraw,et al. Java security - hostile applets, holes and antidotes: what every netscape and internet explorer user needs to know , 1997 .
[2] Gary McGraw,et al. Java security: hostile applets, holes&antidotes , 1997 .
[3] Frederick B. Cohen. A note on distributed coordinated attacks , 1996, Comput. Secur..
[4] Dan S. Wallach,et al. Web Spoofing: An Internet Con Game , 1997 .
[5] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.0 , 1996, RFC.
[6] Scott Oaks,et al. Java Security , 1998 .
[7] Steve R. White. Covert Distributed Processing with Computer Viruses , 1989, CRYPTO.
[8] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.
[9] Dan S. Wallach,et al. Java security: from HotJava to Netscape and beyond , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.