Author:
Koribeche Wassim,Espes David,Morin Cédric
Publisher
Springer Nature Switzerland
Reference11 articles.
1. Gregg, M. (ed.): Hack the Stack, pp. 151–203. Syngress. https://doi.org/10.1016/B978-159749109-9/50009-5, https://www.sciencedirect.com/science/article/pii/B9781597491099500095
2. Garcia, N.M., Gil, F., Matos, B., Yahaya, C., Pombo, N., Goleva, R.I.: Keyed user datagram protocol: concepts and operation of an almost reliable connectionless transport protocol. IEEE Access 7, 18951–18963 (2018). https://doi.org/10.1109/ACCESS.2018.2886707
3. Gouda, M.G., Liu, A.X.: A model of stateful firewalls and its properties. In: 2005 International Conference on Dependable Systems and Networks (DSN’05), pp. 128–137. IEEE (2005)
4. Huang, H., Hu, L., Chu, J., Cheng, X.: An authentication scheme to defend against UDP DrDoS attacks in 5g networks. IEEE Access 7, 175970–175979 (2019). https://doi.org/10.1109/ACCESS.2019.2957565
5. Hussain, M.A., Jin, H., Hussien, Z.A., Abduljabbar, Z.A., Abbdal, S.H., Ibrahim, A.: DNS protection against spoofing and poisoning attacks. In: 2016 3rd International Conference on Information Science and Control Engineering (ICISCE), pp. 1308–1312 (2016). https://doi.org/10.1109/ICISCE.2016.279