![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Griwodz Carsten Fiksdal Steffen Halvorsen Pål
Publisher: Emerald Group Publishing Ltd
ISSN: 1065-0741
Source: Campus-Wide Information Systems, Vol.21, Iss.5, 2004-12, pp. : 205-210
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Simulation of malicious activity in wide area networks
By Antonenko V.
Programming and Computer Software, Vol. 39, Iss. 1, 2013-01 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
By Tu Jiun-Yu Wu Jung-Shyr Hsu Chiung-Fang
International Journal of Internet Protocol Technology, Vol. 6, Iss. 1-2, 2011-06 ,pp. :