On the Security and Vulnerability of PING.
Mohamed G. GoudaChin-Tser HuangAnish AroraPublished in: WSS (2001)
Keyphrases
- security vulnerabilities
- buffer overflow
- security issues
- information security
- risk assessment
- security requirements
- security risks
- security systems
- security threats
- network security
- security policies
- denial of service attacks
- data security
- denial of service
- security management
- security problems
- intrusion detection
- information systems
- security analysis
- key management
- security measures
- security mechanisms
- statistical databases
- information assurance