Attack time

Results: 284



#Item
151Netflow / Traffic flow / Network management / Internet Protocol / Internet protocol suite / Transmission Control Protocol / Communications protocol / Plug-in / Witty / Computing / Data / System software

A Framework for Real-Time Worm Attack Detection and Backbone Monitoring

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2005-08-16 11:03:20
152Political science / Pacifism / Sovereignty / Nationalism / World government / League of Nations / Collective security / Nation state / International relations / Peace / Social philosophy / Sociology

Pacifism is not enough nor patriotism either By Lord Lothian There has never been a time when there has been so widespread and determined an attack on the institution

Add to Reading List

Source URL: www.federalunion.org.uk

Language: English - Date: 2010-08-18 17:20:26
153Software testing / Exploit / Zero-day attack / Vulnerability / Compass / Patch / Computer security / Cyberwarfare / Computer network security

THE GAP OF INSECURITY All Internet facing servers are vulnerable at least - from time to time Ivan Bütler, E1

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:25
154War in Afghanistan / Sociology / Military use of children / Afghanistan / Suicide attack / Kabul / Ethics / Asia / Watchlist / Human rights abuses

EMBARGOED UNTIL 10:30AM NEW YORK TIME (EST) JUNE 14, 2010 Contact: Eva Smets (New York) +[removed]or +[removed]mobile) email: [removed] New Report Calls on World Leaders to Protect Afghanistan’s

Add to Reading List

Source URL: watchlist.org

Language: English - Date: 2014-03-28 00:58:07
155Denial-of-service attack / Time management / Computer architecture / Software / Computing / DOS

To Dos One Stop Service Tracking Module 9: To Dos Introduction to Module 9: To Dos

Add to Reading List

Source URL: floridajobs.org

Language: English - Date: 2003-02-20 09:50:40
156Cyberwarfare / Session border controller / Session Initiation Protocol / Firewall / Denial-of-service attack / SIP Trunking / SIP connection / Real-time Transport Protocol / Application-level gateway / Voice over IP / Videotelephony / Computer network security

A Blueprint for Enterprise Session Border Controller - Whitepaper

Add to Reading List

Source URL: www.oracle.com

Language: English
157Attack on Pearl Harbor / Pearl Harbor / Daughtry / Infamy Speech / Pearl Brewing Company / Pearl Jam / Pearl / Todd Bolender / Ballet / Film / Sony Music Entertainment

TRACKS OF TIME Monthly Publication from the Zephyrhills Historical Association Volume 16 – Number 12 December 2014

Add to Reading List

Source URL: www.fivay.org

Language: English - Date: 2014-12-31 20:05:37
158MISTY1 / Boomerang attack / Key schedule / Feistel cipher / ICE / Differential cryptanalysis / E0 / A5/1 / Block cipher / Cryptography / KASUMI / Stream ciphers

A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir Faculty of Mathematics and Computer Science Weizmann Institute of Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-10 13:51:33
159Network architecture / Denial-of-service attacks / Internet / Cyberwarfare / Internet standards / Denial-of-service attack / Transmission Control Protocol / NetBIOS / Network Time Protocol / Computing / Internet protocols / Computer network security

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc K¨uhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum Abstract Amplification vu

Add to Reading List

Source URL: syssec.rub.de

Language: English - Date: 2014-07-23 03:58:14
160Internet / Network architecture / Internet standards / Computer network security / Network protocols / Denial-of-service attack / Network Time Protocol / Transmission Control Protocol / NetBIOS / Computing / Internet protocols / Denial-of-service attacks

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz, Ruhr-University Bochum https://www.usenix.org/conference/usenixsecurity14/technical-

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-01-15 03:35:06
UPDATE