Comparative Evaluation of Spoofing Defenses. Kissel, E. & Mirkovic, J Proceedings of IEEE Transactions on Dependable and Secure Computing, 2009. bibtex @article{kissel2009comparative,
title={Comparative Evaluation of Spoofing Defenses},
author={Kissel, Ezra and Mirkovic, J},
journal={Proceedings of IEEE Transactions on Dependable and Secure Computing},
pages={218--232},
year={2009}
}
Downloads: 0
{"_id":"hLrXuwmoELiE8Jaqs","bibbaseid":"kissel-mirkovic-comparativeevaluationofspoofingdefenses-2009","author_short":["Kissel, E.","Mirkovic, J"],"bibdata":{"bibtype":"article","type":"article","title":"Comparative Evaluation of Spoofing Defenses","author":[{"propositions":[],"lastnames":["Kissel"],"firstnames":["Ezra"],"suffixes":[]},{"propositions":[],"lastnames":["Mirkovic"],"firstnames":["J"],"suffixes":[]}],"journal":"Proceedings of IEEE Transactions on Dependable and Secure Computing","pages":"218–232","year":"2009","bibtex":"@article{kissel2009comparative,\n title={Comparative Evaluation of Spoofing Defenses},\n author={Kissel, Ezra and Mirkovic, J},\n journal={Proceedings of IEEE Transactions on Dependable and Secure Computing},\n pages={218--232},\n year={2009}\n}\n\n","author_short":["Kissel, E.","Mirkovic, J"],"key":"kissel2009comparative","id":"kissel2009comparative","bibbaseid":"kissel-mirkovic-comparativeevaluationofspoofingdefenses-2009","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/network/files/2WNBgwTRfefSKBGKb","dataSources":["Lc8KDmQn8RuDaFqeg","nxSyfTE8ojajS8Wcm","2Fkx7mpveyLCGzDsW","smJny2HbQ4ct2q8T6","5ByepEgrvFujJFiRX"],"keywords":[],"search_terms":["comparative","evaluation","spoofing","defenses","kissel","mirkovic"],"title":"Comparative Evaluation of Spoofing Defenses","year":2009}