von Eye, Felix, Grabatin, Michael and Hommel, Wolfgang. "Detecting Stealthy Backdoors and Port Knocking Sequences through Flow Analysis"
PIK - Praxis der Informationsverarbeitung und Kommunikation, vol. 38, no. 3-4, 2015, pp. 97-104.
https://doi.org/10.1515/pik-2015-0011
von Eye, F., Grabatin, M. & Hommel, W. (2015). Detecting Stealthy Backdoors and Port Knocking Sequences through Flow Analysis.
PIK - Praxis der Informationsverarbeitung und Kommunikation,
38(3-4), 97-104.
https://doi.org/10.1515/pik-2015-0011
von Eye, F., Grabatin, M. and Hommel, W. (2015) Detecting Stealthy Backdoors and Port Knocking Sequences through Flow Analysis. PIK - Praxis der Informationsverarbeitung und Kommunikation, Vol. 38 (Issue 3-4), pp. 97-104.
https://doi.org/10.1515/pik-2015-0011
von Eye, Felix, Grabatin, Michael and Hommel, Wolfgang. "Detecting Stealthy Backdoors and Port Knocking Sequences through Flow Analysis"
PIK - Praxis der Informationsverarbeitung und Kommunikation 38, no. 3-4 (2015): 97-104.
https://doi.org/10.1515/pik-2015-0011
von Eye F, Grabatin M, Hommel W. Detecting Stealthy Backdoors and Port Knocking Sequences through Flow Analysis.
PIK - Praxis der Informationsverarbeitung und Kommunikation. 2015;38(3-4): 97-104.
https://doi.org/10.1515/pik-2015-0011
Copied to clipboard