Home > Refereed Conference Papers > Application-Based TCP Hijacking > Keywords |
<record>
<controlfield tag="001">180</controlfield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">TCP hijacking</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">application-based TCP hijacking</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Windows Live Messenger</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">application protocols</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">packet injection </subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">ABTH</subfield>
</datafield>
</record>