On the Security and Vulnerability of PING
2001 ◽
pp. 124-135
◽