Login / Signup
Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems.
Ruffin White
Gianluca Caiazza
Chenxu Jiang
Xinyue Ou
Zhiyue Yang
Agostino Cortesi
Henrik I. Christensen
Published in:
CoRR (2019)
Keyphrases
</>
management system
telecommunication networks
application level
computer systems
retrieval systems
computer networks
network model
communication channels
peer to peer
complex systems
end to end
buffer overflow