Login / Signup
Vulnerabilities of network control protocols: An example.
Eric C. Rosen
Published in:
RFC (1981)
Keyphrases
</>
network model
application level
control system
computer networks
buffer overflow
communication protocol
control method
complex networks
network traffic
peer to peer
network protocols
network structure
privacy preserving
network architecture
wireless sensor networks
neural network
network configuration
real time