Enhancing the performance and security against media-access-control table overflow vulnerability attacks.

Yih-Jou TzangHong-Yi ChangChih-Hsuan Tzang
Published in: Secur. Commun. Networks (2015)
Keyphrases
  • buffer overflow
  • security problems
  • data corruption
  • security mechanisms
  • security vulnerabilities
  • computer networks
  • security issues
  • security risks
  • security requirements
  • mac protocol
  • information security