Skip to search formSkip to main contentSkip to account menu

IP address spoofing

Known as: Source address spoofing, Internet protocol spoofing, IP Spoofing 
In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a false source IP address, for the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The traditional mechanisms to traverse Network Address Translators (NAT) do not scale well to battery powered mobile-hosts: the… 
2013
2013
This article provides an analysis of the growing phenomenon of community writing groups for military veterans. Drawing on the… 
2009
2009
Over the recent years, IP and email spoofing gained much importance for security concerns due to the current changes in… 
2009
2009
Botnet-based distributed denial of service (DDoS) attacks represent an emerging and sophisticated threat for today's Internet… 
2009
2009
IP traceback is one of the most important parts of the defense mechanism against DDoS attacks that widely use IP spoofing… 
2009
2009
Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with… 
2008
2008
Internet hosts are threatened by large-scale Distributed Denialof-Service (DDoS) attacks. The Path Identification DDoS defense… 
2008
2008
Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to… 
2006
2006
Distributed denial-of-service (DDoS) attacks present serious threats to servers in the Internet. They can exhaust critical… 
2005
2005
The boundary of a distributed denial of service attack, one of the most threatening attacks in a wired network, now extends to…