Login / Signup
Foiling an Attack - Defeating IPSec Tunnel Fingerprinting.
Vafa D. Izadinia
Jan H. P. Eloff
Derrick G. Kourie
Published in:
ISSA (2005)
Keyphrases
</>
authentication protocol
countermeasures
secret key
dos attacks
simulation model
network security
genetic algorithm
digital images
denial of service attacks
key exchange protocol
neural network
information systems
copyright protection
malicious attacks
power analysis