Skip to content

Latest commit

 

History

History
31 lines (19 loc) · 1.4 KB

README.md

File metadata and controls

31 lines (19 loc) · 1.4 KB

Amplification Attacks Using the Constrained Application Protocol (CoAP)

This is the working area for the IRTF Thing-to-Thing Research Group Internet-Draft, "Amplification Attacks Using the Constrained Application Protocol (CoAP)".

Contributing

See the guidelines for contributions.

Contributions can be made by creating pull requests. The GitHub interface supports creating pull requests using the Edit (✏) button.

Command Line Usage

Formatted text and HTML versions of the draft can be built using make.

$ make

Command line usage requires that you have the necessary software installed. See the instructions.