chore(bib): use howpublished with \url for urls
This commit is contained in:
parent
1180360c2b
commit
ef40e1da6b
@ -22,7 +22,7 @@
|
|||||||
title={NTPd devices},
|
title={NTPd devices},
|
||||||
author={Shodan},
|
author={Shodan},
|
||||||
publisher={Shodan},
|
publisher={Shodan},
|
||||||
howpublished={https://www.shodan.io/search?query=ntpd},
|
howpublished={\url{https://www.shodan.io/search?query=ntpd}},
|
||||||
year=2021,
|
year=2021,
|
||||||
month=mar,
|
month=mar,
|
||||||
note={[online] Accessed: 2021-03-06},
|
note={[online] Accessed: 2021-03-06},
|
||||||
@ -30,126 +30,126 @@
|
|||||||
|
|
||||||
@inproceedings{rfc4271bgp4,
|
@inproceedings{rfc4271bgp4,
|
||||||
number="{Technical report 4271}",
|
number="{Technical report 4271}",
|
||||||
howpublished={RFC 4271},
|
|
||||||
institution={Internet Engineering Task Force},
|
institution={Internet Engineering Task Force},
|
||||||
publisher={Internet Engineering Task Force},
|
publisher={Internet Engineering Task Force},
|
||||||
doi={10.17487/RFC4271},
|
doi={10.17487/RFC4271},
|
||||||
url={https://datatracker.ietf.org/doc/html/rfc4271},
|
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc4271}},
|
||||||
author={Yakov Rekhter and Susan Hares and Tony Li},
|
author={Yakov Rekhter and Susan Hares and Tony Li},
|
||||||
title={{A Border Gateway Protocol 4 (BGP-4)}},
|
title={{A Border Gateway Protocol 4 (BGP-4)}},
|
||||||
pagetotal=104,
|
pagetotal=104,
|
||||||
pages=4,
|
pages=4,
|
||||||
year=2006,
|
year=2006,
|
||||||
month=jan,
|
month=jan,
|
||||||
|
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc4271}}"
|
||||||
}
|
}
|
||||||
|
|
||||||
@techreport{rfc3704multihomed,
|
@techreport{rfc3704multihomed,
|
||||||
series={Request for Comments},
|
series={Request for Comments},
|
||||||
number=3704,
|
number=3704,
|
||||||
howpublished={RFC 3704},
|
|
||||||
institution={Internet Engineering Task Force},
|
institution={Internet Engineering Task Force},
|
||||||
publisher={Internet Engineering Task Force},
|
publisher={Internet Engineering Task Force},
|
||||||
doi={10.17487/RFC3704},
|
doi={10.17487/RFC3704},
|
||||||
url={https://datatracker.ietf.org/doc/html/rfc4271},
|
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc4271}},
|
||||||
author={Fred Baker and Pekka Savola},
|
author={Fred Baker and Pekka Savola},
|
||||||
title={{Ingress Filtering for Multihomed Networks}},
|
title={{Ingress Filtering for Multihomed Networks}},
|
||||||
pagetotal=16,
|
pagetotal=16,
|
||||||
year=2004,
|
year=2004,
|
||||||
month=mar,
|
month=mar,
|
||||||
|
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc4271}}"
|
||||||
}
|
}
|
||||||
|
|
||||||
@techreport{rfc793tcp,
|
@techreport{rfc793tcp,
|
||||||
series={Request for Comments},
|
series={Request for Comments},
|
||||||
number=793,
|
number=793,
|
||||||
howpublished={RFC 793},
|
|
||||||
institution={Internet Engineering Task Force},
|
institution={Internet Engineering Task Force},
|
||||||
publisher={Internet Engineering Task Force},
|
publisher={Internet Engineering Task Force},
|
||||||
doi={10.17487/RFC0793},
|
doi={10.17487/RFC0793},
|
||||||
url={https://datatracker.ietf.org/doc/html/rfc793},
|
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc793}},
|
||||||
author={},
|
author={},
|
||||||
title={{Transmission Control Protocol}},
|
title={{Transmission Control Protocol}},
|
||||||
pagetotal=91,
|
pagetotal=91,
|
||||||
year=1981,
|
year=1981,
|
||||||
month=sep,
|
month=sep,
|
||||||
|
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc793}}"
|
||||||
}
|
}
|
||||||
|
|
||||||
@techreport{rfc1918,
|
@techreport{rfc1918,
|
||||||
series={Request for Comments},
|
series={Request for Comments},
|
||||||
number=1918,
|
number=1918,
|
||||||
howpublished={RFC 1918},
|
|
||||||
institution={Internet Engineering Task Force},
|
institution={Internet Engineering Task Force},
|
||||||
publisher={Internet Engineering Task Force},
|
publisher={Internet Engineering Task Force},
|
||||||
doi={10.17487/RFC1918},
|
doi={10.17487/RFC1918},
|
||||||
url={https://datatracker.ietf.org/doc/html/rfc1918},
|
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc1918}},
|
||||||
author={Robert Moskowitz and Daniel Karrenberg and Yakov Rekhter and Eliot Lear and Geert Jan de Groot},
|
author={Robert Moskowitz and Daniel Karrenberg and Yakov Rekhter and Eliot Lear and Geert Jan de Groot},
|
||||||
title={{Address Allocation for Private Internets}},
|
title={{Address Allocation for Private Internets}},
|
||||||
pagetotal=9,
|
pagetotal=9,
|
||||||
year=1996,
|
year=1996,
|
||||||
month=feb,
|
month=feb,
|
||||||
|
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc1918}}"
|
||||||
}
|
}
|
||||||
|
|
||||||
@techreport{rfc3882,
|
@techreport{rfc3882,
|
||||||
series={Request for Comments},
|
series={Request for Comments},
|
||||||
number=3882,
|
number=3882,
|
||||||
howpublished={RFC 3882},
|
|
||||||
institution={Internet Engineering Task Force},
|
institution={Internet Engineering Task Force},
|
||||||
publisher={Internet Engineering Task Force},
|
publisher={Internet Engineering Task Force},
|
||||||
doi={10.17487/RFC3882},
|
doi={10.17487/RFC3882},
|
||||||
url={https://datatracker.ietf.org/doc/html/rfc3882},
|
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc3882}},
|
||||||
author={Doughan Turk},
|
author={Doughan Turk},
|
||||||
title={{Configuring BGP to Block Denial-of-Service Attacks}},
|
title={{Configuring BGP to Block Denial-of-Service Attacks}},
|
||||||
pagetotal=8,
|
pagetotal=8,
|
||||||
year=2004,
|
year=2004,
|
||||||
month=oct,
|
month=oct,
|
||||||
abstract={This document describes an operational technique that uses BGP communities to remotely trigger black-holing of a particular destination network to block denial-of-service attacks. Black-holing can be applied on a selection of routers rather than all BGP-speaking routers in the network. The document also describes a sinkhole tunnel technique using BGP communities and tunnels to pull traffic into a sinkhole router for analysis. This memo provides information for the Internet community.},
|
abstract={This document describes an operational technique that uses BGP communities to remotely trigger black-holing of a particular destination network to block denial-of-service attacks. Black-holing can be applied on a selection of routers rather than all BGP-speaking routers in the network. The document also describes a sinkhole tunnel technique using BGP communities and tunnels to pull traffic into a sinkhole router for analysis. This memo provides information for the Internet community.},
|
||||||
|
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc3882}}"
|
||||||
}
|
}
|
||||||
|
|
||||||
@techreport{rfc5735,
|
@techreport{rfc5735,
|
||||||
series={Request for Comments},
|
series={Request for Comments},
|
||||||
number=5735,
|
number=5735,
|
||||||
howpublished={RFC 5735},
|
|
||||||
institution={Internet Engineering Task Force},
|
institution={Internet Engineering Task Force},
|
||||||
publisher={Internet Engineering Task Force},
|
publisher={Internet Engineering Task Force},
|
||||||
doi={10.17487/RFC5735},
|
doi={10.17487/RFC5735},
|
||||||
url={https://datatracker.ietf.org/doc/html/rfc5735},
|
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc5735}},
|
||||||
author={Michelle Cotton and Leo Vegoda},
|
author={Michelle Cotton and Leo Vegoda},
|
||||||
title={{Special Use IPv4 Addresses}},
|
title={{Special Use IPv4 Addresses}},
|
||||||
pagetotal=10,
|
pagetotal=10,
|
||||||
year=2010,
|
year=2010,
|
||||||
month=jan,
|
month=jan,
|
||||||
abstract={This document obsoletes RFC 3330. It describes the global and other specialized IPv4 address blocks that have been assigned by the Internet Assigned Numbers Authority (IANA). It does not address IPv4 address space assigned to operators and users through the Regional Internet Registries, nor does it address IPv4 address space assigned directly by IANA prior to the creation of the Regional Internet Registries. It also does not address allocations or assignments of IPv6 addresses or autonomous system numbers. This memo documents an Internet Best Current Practice.},
|
abstract={This document obsoletes RFC 3330. It describes the global and other specialized IPv4 address blocks that have been assigned by the Internet Assigned Numbers Authority (IANA). It does not address IPv4 address space assigned to operators and users through the Regional Internet Registries, nor does it address IPv4 address space assigned directly by IANA prior to the creation of the Regional Internet Registries. It also does not address allocations or assignments of IPv6 addresses or autonomous system numbers. This memo documents an Internet Best Current Practice.},
|
||||||
|
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc5735}}"
|
||||||
}
|
}
|
||||||
|
|
||||||
@techreport{rfc6298,
|
@techreport{rfc6298,
|
||||||
series={Request for Comments},
|
series={Request for Comments},
|
||||||
number=6298,
|
number=6298,
|
||||||
howpublished={RFC 6298},
|
|
||||||
institution={Internet Engineering Task Force},
|
institution={Internet Engineering Task Force},
|
||||||
publisher={Internet Engineering Task Force},
|
publisher={Internet Engineering Task Force},
|
||||||
doi={10.17487/RFC6298},
|
doi={10.17487/RFC6298},
|
||||||
url={https://datatracker.ietf.org/doc/html/rfc6298},
|
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc6298}},
|
||||||
author={Matt Sargent and Jerry Chu and Dr. Vern Paxson and Mark Allman},
|
author={Matt Sargent and Jerry Chu and Dr. Vern Paxson and Mark Allman},
|
||||||
title={{Computing TCP's Retransmission Timer}},
|
title={{Computing TCP's Retransmission Timer}},
|
||||||
pagetotal=11,
|
pagetotal=11,
|
||||||
year=2011,
|
year=2011,
|
||||||
month="{June}",
|
month="{June}",
|
||||||
abstract={This document defines the standard algorithm that Transmission Control Protocol (TCP) senders are required to use to compute and manage their retransmission timer. It expands on the discussion in Section 4.2.3.1 of RFC 1122 and upgrades the requirement of supporting the algorithm from a SHOULD to a MUST. This document obsoletes RFC 2988. {[}STANDARDS-TRACK{]}},
|
abstract={This document defines the standard algorithm that Transmission Control Protocol (TCP) senders are required to use to compute and manage their retransmission timer. It expands on the discussion in Section 4.2.3.1 of RFC 1122 and upgrades the requirement of supporting the algorithm from a SHOULD to a MUST. This document obsoletes RFC 2988. {[}STANDARDS-TRACK{]}},
|
||||||
|
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc6298}}"
|
||||||
}
|
}
|
||||||
|
|
||||||
@techreport{rfc6598,
|
@techreport{rfc6598,
|
||||||
series={Request for Comments},
|
series={Request for Comments},
|
||||||
number=6598,
|
number=6598,
|
||||||
howpublished={RFC 6598},
|
|
||||||
institution={Internet Engineering Task Force},
|
institution={Internet Engineering Task Force},
|
||||||
publisher={Internet Engineering Task Force},
|
publisher={Internet Engineering Task Force},
|
||||||
doi={10.17487/RFC6598},
|
doi={10.17487/RFC6598},
|
||||||
url={https://datatracker.ietf.org/doc/html/rfc6598},
|
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc6598}},
|
||||||
author={Jason Weil and Victor Kuarsingh and Chris Donley and Christopher Liljenstolpe and Marla Azinger},
|
author={Jason Weil and Victor Kuarsingh and Chris Donley and Christopher Liljenstolpe and Marla Azinger},
|
||||||
title={{IANA-Reserved IPv4 Prefix for Shared Address Space}},
|
title={{IANA-Reserved IPv4 Prefix for Shared Address Space}},
|
||||||
pagetotal=11,
|
pagetotal=11,
|
||||||
year=2012,
|
year=2012,
|
||||||
month=apr,
|
month=apr,
|
||||||
abstract={This document obsoletes RFC 3330. It describes the global and other specialized IPv4 address blocks that have been assigned by the Internet Assigned Numbers Authority (IANA). It does not address IPv4 address space assigned to operators and users through the Regional Internet Registries, nor does it address IPv4 address space assigned directly by IANA prior to the creation of the Regional Internet Registries. It also does not address allocations or assignments of IPv6 addresses or autonomous system numbers. This memo documents an Internet Best Current Practice.},
|
abstract={This document obsoletes RFC 3330. It describes the global and other specialized IPv4 address blocks that have been assigned by the Internet Assigned Numbers Authority (IANA). It does not address IPv4 address space assigned to operators and users through the Regional Internet Registries, nor does it address IPv4 address space assigned directly by IANA prior to the creation of the Regional Internet Registries. It also does not address allocations or assignments of IPv6 addresses or autonomous system numbers. This memo documents an Internet Best Current Practice.},
|
||||||
|
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc6598}}"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -157,7 +157,7 @@
|
|||||||
title={Average prefix length},
|
title={Average prefix length},
|
||||||
author={Geoff Huston},
|
author={Geoff Huston},
|
||||||
publisher={potaroo.net},
|
publisher={potaroo.net},
|
||||||
url={https://bgp.potaroo.net/cgi-bin/plota?file=%2fvar%2fdata%2fbgp%2fas2%2e0%2fbgp%2daverage%2dprefix%2etxt&descr=Average%20prefix%20length&ylabel=Average%20prefix%20length&with=step},
|
howpublished={\url{https://bgp.potaroo.net/cgi-bin/plota?file=%2fvar%2fdata%2fbgp%2fas2%2e0%2fbgp%2daverage%2dprefix%2etxt&descr=Average%20prefix%20length&ylabel=Average%20prefix%20length&with=step}},
|
||||||
note={[online] Accessed: 2021-05-11},
|
note={[online] Accessed: 2021-05-11},
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -165,7 +165,7 @@
|
|||||||
title={Average prefix size updated},
|
title={Average prefix size updated},
|
||||||
author={Geoff Huston},
|
author={Geoff Huston},
|
||||||
publisher={potaroo.net},
|
publisher={potaroo.net},
|
||||||
url={https://bgp.potaroo.net/cgi-bin/plota?file=%2fvar%2fdata%2fbgp%2fas2%2e0%2fbgp%2dupd%2davgprefsize%2etxt&descr=Average%20prefix%20size%20updated&ylabel=Average%20prefix%20size%20updated&with=step},
|
howpublished={\url{https://bgp.potaroo.net/cgi-bin/plota?file=%2fvar%2fdata%2fbgp%2fas2%2e0%2fbgp%2dupd%2davgprefsize%2etxt&descr=Average%20prefix%20size%20updated&ylabel=Average%20prefix%20size%20updated&with=step}},
|
||||||
note={[online] Accessed: 2021-05-11},
|
note={[online] Accessed: 2021-05-11},
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -173,7 +173,7 @@
|
|||||||
title={The Bogon Reference},
|
title={The Bogon Reference},
|
||||||
author="{Team Cymru}",
|
author="{Team Cymru}",
|
||||||
publisher={Team Cymru},
|
publisher={Team Cymru},
|
||||||
url={https://team-cymru.com/community-services/bogon-reference/},
|
howpublished={\url{https://team-cymru.com/community-services/bogon-reference/}},
|
||||||
note={[online] Accessed: 2021-05-02},
|
note={[online] Accessed: 2021-05-02},
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -191,7 +191,7 @@
|
|||||||
title={Cisco Annual Internet Report (2018–2023) White Paper},
|
title={Cisco Annual Internet Report (2018–2023) White Paper},
|
||||||
author={Cisco},
|
author={Cisco},
|
||||||
publisher={Cisco},
|
publisher={Cisco},
|
||||||
url={https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html},
|
howpublished={\url{https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html}},
|
||||||
year=2020,
|
year=2020,
|
||||||
month=mar,
|
month=mar,
|
||||||
note={[online] Accessed: 2021-05-02},
|
note={[online] Accessed: 2021-05-02},
|
||||||
@ -203,7 +203,7 @@
|
|||||||
title={Memcached DDoS Attack},
|
title={Memcached DDoS Attack},
|
||||||
author={Cloudflare},
|
author={Cloudflare},
|
||||||
publisher={Cloudflare},
|
publisher={Cloudflare},
|
||||||
url={https://www.cloudflare.com/en-gb/learning/ddos/memcached-ddos-attack/},
|
howpublished={\url{https://www.cloudflare.com/en-gb/learning/ddos/memcached-ddos-attack/}},
|
||||||
note={[online] Accessed: 2021-05-03},
|
note={[online] Accessed: 2021-05-03},
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -213,7 +213,7 @@
|
|||||||
title={DNS Amplification Attacks and Truncated Responses},
|
title={DNS Amplification Attacks and Truncated Responses},
|
||||||
author={Akamai},
|
author={Akamai},
|
||||||
publisher={Akamai},
|
publisher={Akamai},
|
||||||
url={https://blogs.akamai.com/2015/06/dns-amplification-attacks-and-truncated-responses.html},
|
howpublished={\url{https://blogs.akamai.com/2015/06/dns-amplification-attacks-and-truncated-responses.html}},
|
||||||
year=2015,
|
year=2015,
|
||||||
month="{June}",
|
month="{June}",
|
||||||
note={[online] Accessed: 2021-04-03},
|
note={[online] Accessed: 2021-04-03},
|
||||||
@ -225,7 +225,7 @@
|
|||||||
title={2021: VOLUMETRIC DDOS ATTACKS RISING FAST},
|
title={2021: VOLUMETRIC DDOS ATTACKS RISING FAST},
|
||||||
author={Tom Emmons},
|
author={Tom Emmons},
|
||||||
publisher={Akamai},
|
publisher={Akamai},
|
||||||
url={https://blogs.akamai.com/2021/03/in-our-2020-ddos-retrospective},
|
howpublished={\url{https://blogs.akamai.com/2021/03/in-our-2020-ddos-retrospective}},
|
||||||
year=2021,
|
year=2021,
|
||||||
month=mar,
|
month=mar,
|
||||||
note={[online] Accessed: 2021-05-03},
|
note={[online] Accessed: 2021-05-03},
|
||||||
@ -236,7 +236,7 @@
|
|||||||
title={PART I: RETROSPECTIVE 2020: DDOS WAS BACK -- BIGGER AND BADDER THAN EVER BEFORE},
|
title={PART I: RETROSPECTIVE 2020: DDOS WAS BACK -- BIGGER AND BADDER THAN EVER BEFORE},
|
||||||
author={Tom Emmons},
|
author={Tom Emmons},
|
||||||
publisher={Akamai},
|
publisher={Akamai},
|
||||||
url={https://blogs.akamai.com/2021/01/part-i-retrospective-2020-ddos-was-back-bigger-and-badder-than-ever-before.html},
|
howpublished={\url{https://blogs.akamai.com/2021/01/part-i-retrospective-2020-ddos-was-back-bigger-and-badder-than-ever-before.html}},
|
||||||
year=2021,
|
year=2021,
|
||||||
month=jan,
|
month=jan,
|
||||||
note={[online] Accessed: 2021-05-03},
|
note={[online] Accessed: 2021-05-03},
|
||||||
@ -247,7 +247,7 @@
|
|||||||
title={DDoS Defense in a Hybrid Cloud World},
|
title={DDoS Defense in a Hybrid Cloud World},
|
||||||
author={Akamai},
|
author={Akamai},
|
||||||
publisher={Akamai},
|
publisher={Akamai},
|
||||||
url={https://www.akamai.com/us/en/multimedia/documents/ebooks/ddos-defense-in-a-hybrid-cloud-world.pdf},
|
howpublished={\url{https://www.akamai.com/us/en/multimedia/documents/ebooks/ddos-defense-in-a-hybrid-cloud-world.pdf}},
|
||||||
note={[online] Accessed: 2021-05-03},
|
note={[online] Accessed: 2021-05-03},
|
||||||
year=2021,
|
year=2021,
|
||||||
}
|
}
|
||||||
@ -255,7 +255,7 @@
|
|||||||
@misc{linuxretransmission,
|
@misc{linuxretransmission,
|
||||||
title={Linux Networking Documentation >> SNMP Counter},
|
title={Linux Networking Documentation >> SNMP Counter},
|
||||||
author="{The kernel development community}",
|
author="{The kernel development community}",
|
||||||
howpublished={https://www.kernel.org/doc/html/latest/networking/snmp\_counter.html\#tcp-retransmission-and-congestion-control},
|
howpublished={\url{https://www.kernel.org/doc/html/latest/networking/snmp\_counter.html\#tcp-retransmission-and-congestion-control}},
|
||||||
note={[online] Accessed: 2021-05-10},
|
note={[online] Accessed: 2021-05-10},
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -264,7 +264,7 @@
|
|||||||
author={rapid7},
|
author={rapid7},
|
||||||
publisher={GitHub},
|
publisher={GitHub},
|
||||||
journal={GitHub repository},
|
journal={GitHub repository},
|
||||||
howpublished={https://github.com/rapid7/metasploit-framework},
|
howpublished={\url{https://github.com/rapid7/metasploit-framework}},
|
||||||
year=2021,
|
year=2021,
|
||||||
note={[online] Accessed: 2021-04-03},
|
note={[online] Accessed: 2021-04-03},
|
||||||
}
|
}
|
||||||
@ -274,7 +274,7 @@
|
|||||||
author={Pavel Odintsov},
|
author={Pavel Odintsov},
|
||||||
publisher={GitHub},
|
publisher={GitHub},
|
||||||
journal={GitHub repository},
|
journal={GitHub repository},
|
||||||
howpublished={https://github.com/pavel-odintsov/fastnetmon},
|
howpublished={\url{https://github.com/pavel-odintsov/fastnetmon}},
|
||||||
year=2021,
|
year=2021,
|
||||||
note={[online] Accessed: 2021-04-13},
|
note={[online] Accessed: 2021-04-13},
|
||||||
}
|
}
|
||||||
@ -284,7 +284,7 @@
|
|||||||
author={Pavel Odintsov},
|
author={Pavel Odintsov},
|
||||||
publisher={GitHub},
|
publisher={GitHub},
|
||||||
journal={GitHub repository},
|
journal={GitHub repository},
|
||||||
howpublished={https://github.com/Wofbit/fastnetmon},
|
howpublished={\url{https://github.com/Wofbit/fastnetmon}},
|
||||||
year=2021,
|
year=2021,
|
||||||
note={[online] Accessed: 2021-04-13},
|
note={[online] Accessed: 2021-04-13},
|
||||||
}
|
}
|
||||||
@ -294,25 +294,25 @@
|
|||||||
author={P. Odintsov and A. Mirre},
|
author={P. Odintsov and A. Mirre},
|
||||||
publisher={git.dotya.ml},
|
publisher={git.dotya.ml},
|
||||||
journal={git repository},
|
journal={git repository},
|
||||||
howpublished={https://git.dotya.ml/wanderer/fastnetmon-ng},
|
howpublished={\url{https://git.dotya.ml/wanderer/fastnetmon-ng}},
|
||||||
year=2021,
|
year=2021,
|
||||||
note={[online] Accessed: 2021-05-04},
|
note={[online] Accessed: 2021-05-04},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@inproceedings{Boye2012NetfilterCT,
|
@misc{Boye2012NetfilterCT,
|
||||||
title={Netfilter Connection Tracking and NAT Implementation},
|
title={Netfilter Connection Tracking and NAT Implementation},
|
||||||
author={Magnus Boye},
|
author={Magnus Boye},
|
||||||
year=2012,
|
year=2012,
|
||||||
url={https://wiki.aalto.fi/download/attachments/69901948/netfilter-paper.pdf},
|
howpublished={\url{https://wiki.aalto.fi/download/attachments/69901948/netfilter-paper.pdf}},
|
||||||
note={[online] Accessed: 2021-05-05},
|
note={[online] Accessed: 2021-05-05},
|
||||||
}
|
}
|
||||||
|
|
||||||
@inproceedings{Westphal2017CT,
|
@misc{Westphal2017CT,
|
||||||
title={improvements to conntrack table overflow handling},
|
title={improvements to conntrack table overflow handling},
|
||||||
booktitle={Netdev 2.1, The Technical Conference on Linux Networking},
|
booktitle={Netdev 2.1, The Technical Conference on Linux Networking},
|
||||||
author={Florian Westphal},
|
author={Florian Westphal},
|
||||||
url={https://netdevconf.info/2.1/papers/conntrack.pdf},
|
howpublished={\url{https://netdevconf.info/2.1/papers/conntrack.pdf}},
|
||||||
pages=2,
|
pages=2,
|
||||||
year=2017,
|
year=2017,
|
||||||
month=apr,
|
month=apr,
|
||||||
@ -325,7 +325,7 @@
|
|||||||
school={Université catholique de Louvain},
|
school={Université catholique de Louvain},
|
||||||
year=2006,
|
year=2006,
|
||||||
month=aug,
|
month=aug,
|
||||||
url={http://inl.info.ucl.ac.be/system/files/Quoitin-PhD.pdf},
|
howpublished={\url{http://inl.info.ucl.ac.be/system/files/Quoitin-PhD.pdf}},
|
||||||
note={[online] Accessed: 2021-05-02},
|
note={[online] Accessed: 2021-05-02},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user