Login / Signup
Emulation on the Internet Prefix Hijacking Attack Impaction.
Jinjing Zhao
Yan Wen
Published in:
ICT-EurAsia (2013)
Keyphrases
</>
world wide web
databases
tree structure
countermeasures
real time
email
data structure
computer networks
web technologies
secret key
denial of service attacks
job search