Number | Name | Date | Kind |
---|---|---|---|
4672572 | Alsberg | Jun 1987 | A |
4769771 | Lippmann et al. | Sep 1988 | A |
5003595 | Collins et al. | Mar 1991 | A |
5032979 | Hecht et al. | Jul 1991 | A |
5365580 | Morisaki | Nov 1994 | A |
5623601 | Vu | Apr 1997 | A |
5682478 | Watson et al. | Oct 1997 | A |
5757916 | MacDoran et al. | May 1998 | A |
5757924 | Friedman et al. | May 1998 | A |
5781550 | Templin et al. | Jul 1998 | A |
5784559 | Frazier et al. | Jul 1998 | A |
5793951 | Stein et al. | Aug 1998 | A |
5826014 | Coley et al. | Oct 1998 | A |
5828846 | Kirby et al. | Oct 1998 | A |
5864666 | Shrader | Jan 1999 | A |
5867647 | Haigh et al. | Feb 1999 | A |
5892903 | Klaus | Apr 1999 | A |
5958053 | Denker | Sep 1999 | A |
5968176 | Nessett et al. | Oct 1999 | A |
5991881 | Conklin et al. | Nov 1999 | A |
6003030 | Kenner et al. | Dec 1999 | A |
6009475 | Shrader | Dec 1999 | A |
6035404 | Zhao | Mar 2000 | A |
6061650 | Malkin et al. | May 2000 | A |
Entry |
---|
Schuba et al., Analysis of a Denial of Service Attack on TCP, 1997.* |
CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks, Sep. 1996.* |
Webpage titled “Keeping Mobile Users Secure” by Dave Kosiur, Feb. 11, 1998. |
Webpage titled “After Ping of Death, ‘Land’ Attack Disables some Mac Systems” by Ric Ford, Feb. 8, 1997. |
Webpage titled “How Not to be Victim of the Next Hacker Attack” by Annette Hamilton, Dec. 18, 1996. |