Vulnerabilities of network control protocols: an example

Eric C. Rosen. Vulnerabilities of network control protocols: an example. ACM SIGSOFT Software Engineering Notes, 6(1):6-8, 1981. [doi]

Authors

Eric C. Rosen

This author has not been identified. Look up 'Eric C. Rosen' in Google