Slitheen - Perfectly Imitated Decoy Routing Through Traffic Replacement
Association for Computing Machinery (ACM) via YouTube
Overview
This course teaches learners how to implement perfectly imitated decoy routing through traffic replacement. The course aims to provide an understanding of advanced techniques for routing security in computer networks. The teaching method involves presenting research findings and insights from the field of computer and communications security. This course is intended for individuals interested in enhancing their knowledge of network security and routing protocols.
Syllabus
CCS 2016 - Slitheen: Perfectly imitated decoy routing through traffic replacement
Taught by
ACM CCS