Application layer

Results: 377



#Item
1Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
2Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benjaminvandersloot.com

Language: English - Date: 2018-09-18 11:06:16
3Firewall software / Computing / Computer security / Cyberwarfare / Internet security / Web applications / Web application firewall / Application firewall / Fastly / Application security / Firewall / HTTP/2

Fastly WAF Always on, world-class application-layer protection In 2016, 40% of web application threats led to breaches — a fivefold increase from the previous year. As the scope and complexity of application

Add to Reading List

Source URL: www.fastly.com

Language: English - Date: 2017-05-15 17:23:15
4Computing / World Wide Web / Software engineering / Web development / Cryptographic protocols / Secure communication / Internet protocols / Dark web / Tor / .onion / Dynamic web page / HTTPS

Proceedings on Privacy Enhancing Technologies ; ):186–203 Giovanni Cherubin*, Jamie Hayes*, and Marc Juarez* Website Fingerprinting Defenses at the Application Layer

Add to Reading List

Source URL: www.petsymposium.org

Language: English - Date: 2017-10-04 16:18:51
5

Biofilm-based membrane reactors – selected aspects of the application and microbial layer control

Add to Reading List

Source URL: www.deswater.com

Language: English - Date: 2016-12-24 17:20:01
    6

    Application Layer Protocol Negotiation TLS extension for application layer protocol negotiation within the TLS handshake

    Add to Reading List

    Source URL: www.ietf.org

    - Date: 2013-10-29 19:40:03
      7

      F100 Insurer Case Study INSURER DEFEATS APPLICATION LAYER DDOS

      Add to Reading List

      Source URL: www.shapesecurity.com

      - Date: 2016-08-12 14:49:29
        8

        ALOHA LOAD BALANCER LAYER7 IPV6 CONFIGURATION “APPNOTE” #0045 ― LAYER7 IPV6 CONFIGURATION This application note is intended to help you to configure IPv6 at layer 7. REQUIREMENTS

        Add to Reading List

        Source URL: www.haproxy.com

        - Date: 2014-04-28 06:52:20
          9Keyword cipher / Product rule / Index of Abkhazia-related articles

          Broadcast Federation: An Application-layer Broadcast Internetwork Yatin Chawathe Mukund Seshadri

          Add to Reading List

          Source URL: sahara.cs.berkeley.edu

          Language: English - Date: 2002-04-10 14:33:51
          10Computing / Software / System software / Digital Video Broadcasting / Internet protocols / Network performance / Performance-enhancing proxy / DVB-RCS / Interoperability / Telnet / Satellite Internet access / Application layer

          1. document title/ titre du document I NTEROPERABLE PEP (I-PEP) T RANSPORT E XTENSIONS

          Add to Reading List

          Source URL: satlabs.org

          Language: English - Date: 2014-01-21 07:40:07
          UPDATE