A study of pattern analysis for covert channel features based on Internet protocols
碩士 === 大葉大學 === 資訊管理學系碩士班 === 93 === With the growth of Internet technology utilization, hackers can take advantages of security holes of the systems and protocols to develop some complex and various intrusion skills, such as denial of service attacks (DoS), virus attacks and Trojan horse attacks. A...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/95738599564844069863 |