Search alternatives:
attack technical » attacks technical, attacker technical, stack technical
technical paper » technical papers
word attack » world attack, worm attack, work attack

1
Published 2016
Springer India
Table of Contents: ... -- Chapter 63. Malicious File Hash Detection and Drive-by Download Attacks -- Chapter 64. Parameter...

2
Published 2013
Springer New York
Table of Contents: ...-operative Black Hole Attack in MANET -- IP Address Management in Virtualized Cloud Environments -- A Fuzzy C...