Comparative evaluation of spoofing defenses. Mirkovic, J. & Kissel, E. IEEE Transactions on Dependable and Secure Computing, 8(2):218–232, IEEE, 2011. bibtex @article{mirkovic2011comparative,
title={Comparative evaluation of spoofing defenses},
author={Mirkovic, Jelena and Kissel, Ezra},
journal={IEEE Transactions on Dependable and Secure Computing},
volume={8},
number={2},
pages={218--232},
year={2011},
publisher={IEEE}
}
Downloads: 0
{"_id":"J9dKsKqm9wBY8s9nF","bibbaseid":"mirkovic-kissel-comparativeevaluationofspoofingdefenses-2011","author_short":["Mirkovic, J.","Kissel, E."],"bibdata":{"bibtype":"article","type":"article","title":"Comparative evaluation of spoofing defenses","author":[{"propositions":[],"lastnames":["Mirkovic"],"firstnames":["Jelena"],"suffixes":[]},{"propositions":[],"lastnames":["Kissel"],"firstnames":["Ezra"],"suffixes":[]}],"journal":"IEEE Transactions on Dependable and Secure Computing","volume":"8","number":"2","pages":"218–232","year":"2011","publisher":"IEEE","bibtex":"@article{mirkovic2011comparative,\n title={Comparative evaluation of spoofing defenses},\n author={Mirkovic, Jelena and Kissel, Ezra},\n journal={IEEE Transactions on Dependable and Secure Computing},\n volume={8},\n number={2},\n pages={218--232},\n year={2011},\n publisher={IEEE}\n}\n\n","author_short":["Mirkovic, J.","Kissel, E."],"key":"mirkovic2011comparative","id":"mirkovic2011comparative","bibbaseid":"mirkovic-kissel-comparativeevaluationofspoofingdefenses-2011","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/network/files/2WNBgwTRfefSKBGKb","dataSources":["Lc8KDmQn8RuDaFqeg","nxSyfTE8ojajS8Wcm","2Fkx7mpveyLCGzDsW","smJny2HbQ4ct2q8T6","5ByepEgrvFujJFiRX"],"keywords":[],"search_terms":["comparative","evaluation","spoofing","defenses","mirkovic","kissel"],"title":"Comparative evaluation of spoofing defenses","year":2011}