Arthur Berger

Results: 22



#Item
11Survival analysis / Data / Pareto distribution / Weibull distribution / Domain Name System / Hoarding / Lookup table / CPU cache / Computing / Cache / Actuarial science

Modeling TTL-based Internet Caches Jaeyeon Jung, Arthur W. Berger and Hari Balakrishnan MIT Laboratory for Computer Science Cambridge, MA 01239, USA E-mail:{jyjung,awberger,hari}@lcs.mit.edu

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2006-09-21 21:38:54
12Routing / Internet standards / Internet protocols / Network mapping / Subnetwork / Border Gateway Protocol / IP address / Computer network / Network topology / Network architecture / Internet / Computing

Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization Robert Beverly Arthur Berger

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2011-03-30 00:24:53
13Internet / Cyberwarfare / Denial-of-service attacks / Internet standards / Network address translation / IP address spoofing / Ping / Denial-of-service attack / IP address / Computing / Computer network security / Network architecture

Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly Arthur Berger

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2009-11-23 23:36:37
14IPv6 / IPv6 deployment / 6to4 / IP address / DIVI Translation / Google Public DNS / IPv4 / Domain Name System / Classless Inter-Domain Routing / Network architecture / Internet Protocol / Internet

Internet Nameserver IPv4 and IPv6 Address Relationships Arthur Berger MIT CSAIL / Akamai [removed]

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2013-11-12 08:48:00
15Integrated Services Digital Network / Computing / Broadband / Network protocols / Videotelephony / Asynchronous Transfer Mode / Broadband networks / Available Bit Rate / International Teletraffic Congress / Electronic engineering / Teletraffic / Electronics

Curriculum Vitae of ARTHUR W. BERGER Akamai Technologies 8 Cambridge Center Cambridge, MA[removed]Phone: [removed]

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2013-06-11 16:48:01
16Computing / IP address spoofing / Denial-of-service attack / IP traceback / Bogon filtering / DNS spoofing / Martian packet / Ingress filtering / Computer network security / Cyberwarfare / Computer security

Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly, Arthur Berger (MIT), Young Hyun, k claffy (UCSD/CAIDA)

Add to Reading List

Source URL: rbeverly.net

Language: English - Date: 2009-11-10 14:18:22
17IP traceback / Denial-of-service attack / Botnet / Ingress filtering / Spoofing attack / Computer network security / Computing / IP address spoofing

IP Spoofer Project Observations on four-years of data Rob Beverly, Arthur Berger, Young Hyun {rbeverly,awberger}@csail.mit, youngh@caida ISMA AIMS 2009

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2014-09-29 22:51:25
18Computer security / IP address spoofing / Ingress filtering / Firewall / Denial-of-service attack / Network address translation / Reverse path forwarding / Ping / Traffic flow / Computer network security / Computing / Cyberwarfare

Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly Arthur Berger

Add to Reading List

Source URL: rbeverly.net

Language: English - Date: 2009-09-16 16:30:12
19Data security / Computer network security / Cyberwarfare / Port scanner / Nmap / Firewall / Anomaly detection / Transmission Control Protocol / Communications protocol / Computing / Software / Network architecture

Fast Portscan Detection Using Sequential Hypothesis Testing Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA USA jyjung, awberge

Add to Reading List

Source URL: nms.lcs.mit.edu

Language: English - Date: 2004-09-13 14:07:58
20Computing / IP address spoofing / Denial-of-service attack / IP traceback / Bogon filtering / DNS spoofing / Martian packet / Ingress filtering / Computer network security / Cyberwarfare / Computer security

Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly, Arthur Berger (MIT), Young Hyun, k claffy (UCSD/CAIDA)

Add to Reading List

Source URL: www.rbeverly.net

Language: English - Date: 2009-11-10 14:18:22
UPDATE