Cited By
View all- Zhou XDeng QPu JMan KQian ZKrishnamurthy SLuo BLiao XXu JKirda ELie D(2024)Untangling the Knot: Breaking Access Control in Home Wireless Mesh NetworksProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670380(2072-2086)Online publication date: 2-Dec-2024
- Pan YRossow C(2024)TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00265(4497-4515)Online publication date: 19-May-2024
- Wang AFeng XLi QYang YXu K(2024)A Horizontal Study on the Mixed IPID Assignment Vulnerability in the Linux Ecosystem2024 IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS)10.1109/IWQoS61813.2024.10682845(1-10)Online publication date: 19-Jun-2024
- Show More Cited By