Login / Signup
DNS Tunneling for Network Penetration.
Daan Raman
Bjorn De Sutter
Bart Coppens
Stijn Volckaert
Koen De Bosschere
Pieter Danhieux
Erik Van Buggenhout
Published in:
ICISC (2012)
Keyphrases
</>
peer to peer
communication networks
network model
neural network
wireless sensor networks
network structure
network traffic
network architecture
database systems
mobile devices
complex networks
computer networks