Date: 2017-02-16 07:58:12Computer network security Cyberwarfare Computing Computer security Firewall software Internet censorship in China Great Firewall Transmission Control Protocol Intrusion detection system Packet injection Internet protocol suite Firewall | | Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion Sheharbano Khattak∗ ∗ Independent researcher Philip D. Anderson∗ Vern Paxson†Add to Reading ListSource URL: sheharbano.comDownload Document from Source Website File Size: 171,77 KBShare Document on Facebook
|