A Survey of Network Attacks Based on Protocol Vulnerabilities

Gang Xiong, Jiayin Tong, Ye Xu, Hongliang Yu, Yong Zhao. A Survey of Network Attacks Based on Protocol Vulnerabilities. In Weihong Han, Zi Huang, Changjun Hu, Hongli Zhang, Li Guo, editors, Web Technologies and Applications - APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014. Proceedings. Volume 8710 of Lecture Notes in Computer Science, pages 246-257, Springer, 2014. [doi]

@inproceedings{XiongTXYZ14,
  title = {A Survey of Network Attacks Based on Protocol Vulnerabilities},
  author = {Gang Xiong and Jiayin Tong and Ye Xu and Hongliang Yu and Yong Zhao},
  year = {2014},
  doi = {10.1007/978-3-319-11119-3_23},
  url = {http://dx.doi.org/10.1007/978-3-319-11119-3_23},
  researchr = {https://researchr.org/publication/XiongTXYZ14},
  cites = {0},
  citedby = {0},
  pages = {246-257},
  booktitle = {Web Technologies and Applications - APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014. Proceedings},
  editor = {Weihong Han and Zi Huang and Changjun Hu and Hongli Zhang and Li Guo},
  volume = {8710},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-319-11118-6},
}