Piracy Over Peer-To-Peer Based on Personal Network
Wireless Personal Communications: An International Journal
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Wireless Personal Communications: An International Journal
Proceedings of the 27th Annual Computer Security Applications Conference
Hi-index | 0.00 |
Recently, the cyber terror is becoming more complicated, intelligent, and causing more damage. To react more effectively to the future cyber terrors, it will be necessary to anticipate new cyber terror techniques and devise the preventive measures for the possible vulnerabilities of the system before the hackers actually disable the system. This paper verified that the attacking technology on the new vulnerability can paralyze internet service of windows system and smart phone using Android OS. Finally, the routing packets are discarded before they reach the destination and the connection to the destination host cannot be established.