Prevention of IP Spoofing in TCP/IP Connection: Vulnerability Analysis and Probable Solutions. A Reverse Engineering Approach.
M. Karthik NarayananR. SrikanthPublished in: Australian Computer, Network & Information Forensics Conference (2003)
Keyphrases
- reverse engineering
- tcp ip
- ip networks
- internet protocol
- software engineering
- ip address
- computer networks
- software maintenance
- gene regulatory networks
- dynamic analysis
- object oriented
- protocol stack
- local area network
- reverse engineer
- smart card
- transmission control protocol
- network security
- communication networks
- energy consumption
- web services