The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones

Author: Wang Xinyuan  

Publisher: Inderscience Publishers

ISSN: 1747-8405

Source: International Journal of Security and Networks, Vol.1, Iss.3-4, 2006-12, pp. : 184-197

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract