Using the Domain Name System to Thwart Automated Client-Based Attacks
| Year of publication: |
2011-11-07
|
|---|---|
| Authors: | Taylor, Curtis R ; Shue, Craig A |
| Subject: | general and miscellaneous//mathematics, computing, and information science | INTERNET | PERFORMANCE | SECURITY | COMPUTERS | COMPUTER CODES |
-
NARAC SOFTWARE QUALITY ASSURANCE: ADAPTING FORMALISM TO MEET VARYING NEEDS
Walker, H, (2008)
-
Simulation meets reality: Chemical hazard models in real world use
Newsom, D.E., (2008)
-
Legacy system retirement plan for HANDI 2000 business management system
Adams, D.E., (2009)
- More ...
-
Essays on Privacy, Information, and Anonymous Transactions
Wagman, Liad, (2009)
-
Who Initiates Recalls and Who Cares? Evidence from the Automobile Industry.
Rupp, Nicholas G, (2002)
-
Digging for Golden Carrots: An Analysis of Research Tournaments.
Taylor, Curtis R, (1995)
- More ...