Corpus ID: 62434307

Detecting physical layer attacks on Ethernet networks

@inproceedings{Petrenko2015DetectingPL,
  title={Detecting physical layer attacks on Ethernet networks},
  author={A. Petrenko},
  year={2015}
}

References

SHOWING 1-10 OF 30 REFERENCES
Installation Guide for Gig Zero DelayTM Tap and 10/100/1000BaseT Tap [online
  • Santa Clara, CA: Net Optics;
  • 2010
Installation Guide for Gig Zero DelayTM Tap and 10/100/1000BaseT Tap [online
  • Santa Clara, CA: Net Optics;
  • 2010
Encyclopedia of information ethics and security
Network+ Training Guide. Indianapolis, IN: Que
  • 2002
Ethernet: The Definitive Guide
Ethernet is a core networking technology used by every high tech business. While the basic protocols have changed little, new options such as Fast Ethernet and Gigabit Ethernet have increased theExpand
Ethernet: The Definitive Guide: The Definitive Guide
  • 2000
Practical Packet Analysis Using Wireshark To Solve Real World Network Problems
Unauthorized Access - The Crisis in Online Privacy and Security
TLDR
Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. Expand
Real World Linux Security: Intrusion Prevention, Detection and Recovery
List of Figures. List of Tables. Foreword. Acknowledgments. About the Author. 1. Introduction. Introduction to the Second Edition. Who Should Read This Book? How This Book Is Organized. What Are YouExpand
Security in computing
TLDR
This book describes the security pitfalls inherent in many important computing tasks today and points out where existing controls are inadequate and serious consideration must be given to the risk present in the computing situation. Expand
...
1
2
3
...