作者: J. Mcdermott
DOI: 10.1007/978-0-387-35285-5_13
关键词: Jamming 、 Computer virus 、 Information warfare 、 Computer security 、 Trojan horse 、 Engineering 、 Replication (computing)
摘要: Recent literature on information warfare has suggested that general replication is not useful in dealing with storage jamming attacks. We show special cases of are only detecting but also recovering from