Publication Details
Title: Reflections on Witty: Analyzing the Attacker
Author: N. Weaver and D. Ellis
Group: Networking
Date: June 2004
PDF: http://www.icsi.berkeley.edu/pubs/networking/reflectionson04.pdf
Acknowledgements:
This work was partially supported by funding provided to ICSI through National Science Foundation grant CNS: 0335290 ("Testing and Benchmarking Methodologies for Future Network Security Mechanisms "). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators and do not necessarily reflect the views of the National Science Foundation.
Bibliographic Information:
;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37
Bibliographic Reference:
N. Weaver and D. Ellis. Reflections on Witty: Analyzing the Attacker. ;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37, June 2004
Author: N. Weaver and D. Ellis
Group: Networking
Date: June 2004
PDF: http://www.icsi.berkeley.edu/pubs/networking/reflectionson04.pdf
Acknowledgements:
This work was partially supported by funding provided to ICSI through National Science Foundation grant CNS: 0335290 ("Testing and Benchmarking Methodologies for Future Network Security Mechanisms "). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators and do not necessarily reflect the views of the National Science Foundation.
Bibliographic Information:
;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37
Bibliographic Reference:
N. Weaver and D. Ellis. Reflections on Witty: Analyzing the Attacker. ;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37, June 2004
