

Author: Trabelsi Zouheir El-Hajj Wassim
Publisher: Inderscience Publishers
ISSN: 1743-8209
Source: International Journal of Internet Protocol Technology, Vol.5, Iss.1-2, 2010-04, pp. : 92-100
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Spoofing and Anti-Spoofing Measures
Information Security Technical Report, Vol. 7, Iss. 4, 2002-12 ,pp. :


IpMorph: fingerprinting spoofing unification
Journal in Computer Virology, Vol. 6, Iss. 4, 2010-11 ,pp. :




International Journal of Cloud Applications and Computing (IJCAC), Vol. 6, Iss. 3, 2016-07 ,pp. :