{"draft":"","doc_id":"RFC0789","title":" Vulnerabilities of network control protocols: An example ","authors":["E.C. Rosen"],"format":["ASCII","HTML"],"page_count":"16","pub_status":"UNKNOWN","status":"UNKNOWN","source":"Legacy","abstract":" ","pub_date":"July 1981","keywords":[" "],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC0789","errata_url":null}