Why TCP timers don't work well
SIGCOMM '86 Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Congestion avoidance and control
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Improving round-trip time estimates in reliable transport protocols
ACM Transactions on Computer Systems (TOCS)
Internetworking with TCP/IP (vol. 2, 2nd ed.): design, implementation, and internals
Internetworking with TCP/IP (vol. 2, 2nd ed.): design, implementation, and internals
Testing of fault-tolerant and real-time distributed systems via protocol fault injection
FTCS '96 Proceedings of the The Twenty-Sixth Annual International Symposium on Fault-Tolerant Computing (FTCS '96)
VirtualWire: A Fault Injection and Analysis Tool for Network Protocols
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Protocol discovery in multiprotocol networks
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
Protocol discovery in multiprotocol networks
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Advanced Network Fingerprinting
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
DIMVA '09 Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Automated Behavioral Fingerprinting
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
The limits of automatic OS fingerprint generation
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
B@bel: leveraging email delivery for spam mitigation
Security'12 Proceedings of the 21st USENIX conference on Security symposium
OS-Sommelier: memory-only operating system fingerprinting in the cloud
Proceedings of the Third ACM Symposium on Cloud Computing
Hi-index | 0.00 |
Many have frittered away their time on C++, while overlooking the new, POSIX.2-required, object-oriented language: sh. As will be clear from the enclosed code, the name may allude to the fact that the author would be embarrassed to have anyone find out ...