Sciweavers

531 search results - page 107 / 107
» Formal Methods for Networks on Chips
Sort
View
IJSN
2006
65views more  IJSN 2006»
14 years 11 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang