Login / Signup

DNS Tunneling for Network Penetration.

Daan RamanBjorn De SutterBart CoppensStijn VolckaertKoen De BosscherePieter DanhieuxErik Van Buggenhout
Published in: ICISC (2012)
Keyphrases
  • peer to peer
  • communication networks
  • network model
  • neural network
  • wireless sensor networks
  • network structure
  • network traffic
  • network architecture
  • database systems
  • mobile devices
  • complex networks
  • computer networks