t2trg / t2trg-amplification-attacks

Other
3 stars 0 forks source link

Amplification Attacks Using the Constrained Application Protocol (CoAP)

This is the working area for the IRTF Thing-to-Thing Research Group Internet-Draft, "Amplification Attacks Using the Constrained Application Protocol (CoAP)".

Contributing

See the guidelines for contributions.

Contributions can be made by creating pull requests. The GitHub interface supports creating pull requests using the Edit (✏) button.

Command Line Usage

Formatted text and HTML versions of the draft can be built using make.

$ make

Command line usage requires that you have the necessary software installed. See the instructions.