메뉴 건너뛰기




Volumn , Issue , 2008, Pages 393-398

A practical analysis of the robustness and stability of the network stack in smartphones

Author keywords

Network scanning; Network stack; Penetration testing; Smartphones; Vulnerability scanning

Indexed keywords

NETWORK SCANNING; NETWORK STACK; PENETRATION TESTING; SMARTPHONES; VULNERABILITY SCANNING;

EID: 66149163213     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCITECHN.2008.4803083     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 7
    • 66149168961 scopus 로고    scopus 로고
    • Accessed on 21st April
    • http://www.microsoft.com/technet/solutionaccelerators/mobile /maintain/SecModel/aff7cf7f-0e11-4ef4-8626-f33bd969b35a. mspx?mfr=true , Accessed on 21st April 2008.
    • (2008)
  • 10
    • 66149167599 scopus 로고    scopus 로고
    • released on 30th May, released on 30th May
    • Nessus Vulnerability Scanner v3.2.1, http://www.nessus.org/nessus/, released on 30th May 2008.
    • (2008) Nessus Vulnerability Scanner v3.2.1
  • 14
    • 0347227352 scopus 로고    scopus 로고
    • Published on February 14
    • CVE ID: CVE-2006-10021 "IGMP v3 DoS Vulnerability", http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-0021, National Vulnerability Database, National Institute of Standards and Technology, Published on February 14, 2006.
    • (2006) National Institute of Standards and Technology
  • 18
    • 84912141863 scopus 로고    scopus 로고
    • "TCP/IP Architecture", http://www.microsoft.com/technet/ archive/winntas/maintain/tcparch.mspx?mfr=true
    • TCP/IP Architecture"


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.