skip to main content
article

Vulnerabilities of network control protocols: an example

Published: 01 January 1981 Publication History

Abstract

No abstract available.

References

[1]
J. M. McQuillan, I. Richer, E. C. Rosen, "The New Routing Algorithm for the ARPANET", IEEE Transactions on Communications, May 1980.
[2]
E. C. Rosen, "The Updating Protocol of ARPANET's New Routing Algorithm", Computer Networks, February 1980.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 6, Issue 1
January 1981
13 pages
ISSN:0163-5948
DOI:10.1145/1005920
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 1981
Published in SIGSOFT Volume 6, Issue 1

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2007)Safe Computing in the Age of Ubiquitous Connectivity2007 IEEE Long Island Systems, Applications and Technology Conference10.1109/LISAT.2007.4312645(1-7)Online publication date: May-2007
  • (2007)Reflections on System Trustworthiness10.1016/S0065-2458(06)70006-7(269-310)Online publication date: 2007
  • (2006)Performing real-time threat assessment of security incidents using data fusion of IDS logsJournal of Computer Security10.5555/1239319.123932114:6(513-534)Online publication date: 1-Nov-2006
  • (2006)System and network trustworthiness in perspectiveProceedings of the 13th ACM conference on Computer and communications security10.1145/1180405.1180406(1-5)Online publication date: 30-Oct-2006
  • (2006)Risks of UntrustworthinessProceedings of the 22nd Annual Computer Security Applications Conference10.1109/ACSAC.2006.45(321-328)Online publication date: 11-Dec-2006
  • (2006)Reliable software and communication IIIIEEE Journal on Selected Areas in Communications10.1109/49.26570212:1(40-45)Online publication date: 1-Sep-2006
  • (2003)Correct Passive Testing Algorithms and Complete Fault CoverageFormal Techniques for Networked and Distributed Systems - FORTE 200310.1007/978-3-540-39979-7_20(303-318)Online publication date: 2003
  • (1997)Passive testing and applications to network managementProceedings 1997 International Conference on Network Protocols10.1109/ICNP.1997.643699(113-122)Online publication date: 1997
  • (1996)Systems Safety, Normal Accidents, and Social VulnerabilityComputerization and Controversy10.1016/B978-0-12-415040-9.50144-5(746-763)Online publication date: 1996
  • (1992)Avoiding weak linksCommunications of the ACM10.1145/138859.13887235:12(146)Online publication date: 1-Dec-1992
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media