Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools

H. S. Venter, Jan H. P. Eloff. Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools. Computers & Security, 17(8):683-692, 1998. [doi]

@article{VenterE98,
  title = {Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools},
  author = {H. S. Venter and Jan H. P. Eloff},
  year = {1998},
  doi = {10.1016/S0167-4048(98)80099-0},
  url = {http://dx.doi.org/10.1016/S0167-4048(98)80099-0},
  tags = {data-flow},
  researchr = {https://researchr.org/publication/VenterE98},
  cites = {0},
  citedby = {0},
  journal = {Computers & Security},
  volume = {17},
  number = {8},
  pages = {683-692},
}