... 10 million probe packets from two topologically distinct Wolfenstein enemy territory servers in 2006, this paper shows that probe ...
Tópico(s): Complex Network Analysis Techniques
2007 - Institute of Electrical and Electronics Engineers | The ... IEEE International Conference on Networks/The IEEE International Conference on Networks
... from Valve's Counterstrike:Source and idSoftware's Wolfenstein Enemy Territory this paper demonstrates that pre-probing a subset ...
Tópico(s): Distributed and Parallel Computing Systems
2008 - Springer Science+Business Media | Lecture notes in computer science
Antonio Cricenti, Philip Branch, Grenville Armitage,
... Life 2 Counter-Strike, Quake III Arena and Wolfenstein Enemy Territory. For each of these games we analyse sessions ...
Tópico(s): Network Security and Intrusion Detection
2007 - Institute of Electrical and Electronics Engineers | The ... IEEE International Conference on Networks/The IEEE International Conference on Networks
... reference to another iconic first-person shooter franchise, Wolfenstein, which also originated in the 1980s and has ... video games.ReferencesBaker, Meguey. “Problematizing Power Fantasy.” The Enemy 1.2 (2015). 18 Feb. 2018 <http://theenemyreader. ...
Tópico(s): Sexuality, Behavior, and Technology
2018 - Queensland University of Technology | M/C Journal