Skip to content

t2trg/t2trg-amplification-attacks

Repository files navigation

Amplification Attacks Using the Constrained Application Protocol (CoAP)

This is the working area for the IRTF Thing-to-Thing Research Group Internet-Draft, "Amplification Attacks Using the Constrained Application Protocol (CoAP)".

Contributing

See the guidelines for contributions.

Contributions can be made by creating pull requests. The GitHub interface supports creating pull requests using the Edit (✏) button.

Command Line Usage

Formatted text and HTML versions of the draft can be built using make.

$ make

Command line usage requires that you have the necessary software installed. See the instructions.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published