Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack

Page Content

Sheila Becker

Oct 26, 2011

Size: 446.8MB

Get the Flash Player to see this player.

« Back to Abstract & Bio

© 1999-2013 Purdue University. All rights reserved.

Use/Reuse Guidelines

CERIAS Seminar materials are intended for educational, non-commercial use only and any or all commercial use is prohibited. Any use must attribute "The CERIAS Seminar at Purdue University." Opinions expressed in the recordings are not necessarily representative of the views of CERIAS or of Purdue University.