z-logo
open-access-imgOpen Access
Analysis of protection spanning-tree protocol
Author(s) -
Б.Я. Корнієнко,
С.О. Сулима
Publication year - 2007
Publication title -
vìsnik nacìonalʹnogo avìacìĭnogo unìversitetu
Language(s) - Uncategorized
Resource type - Journals
eISSN - 2306-1472
pISSN - 1813-1166
DOI - 10.18372/2306-1472.31.1433
Subject(s) - vulnerability (computing) , computer security , protocol (science) , spanning tree , tree (set theory) , dozen , computer science , internet privacy , medicine , arithmetic , mathematics , alternative medicine , pathology , combinatorics , mathematical analysis

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here