Attack

Results: 9771



#Item
991Network performance / Cyberwarfare / Denial-of-service attacks / Pseudorandom number generator / Measuring network throughput / Network packet / Denial-of-service attack / Network telescope / Witty / Transmission Control Protocol / Code Red / Packet loss

Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:03
992Domain name system / Anycast / Domain Name System Security Extensions / Name server / Denial-of-service attack / Draft:DNS Made Easy / Comparison of DNS server software

| www.dnsmadeeasy.com | IP Anycast+ Enterprise DNS Services MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD

Add to Reading List

Source URL: www.dnsmadeeasy.com

Language: English - Date: 2015-12-08 13:37:24
993Actuarial science / Computer security / Security / Software maintenance / Computer network security / Patch / Vulnerability / Risk / Computer worm / Attack / Patch Tuesday / SAINT

VOLUME THREE · ISSUE TWO Secure Business Quarterly: Defining the Value of Strategic Security ILLUSTRATION: JUD GUITTEAU

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 12:01:38
994Decoy / Denial-of-service attacks / Salvatore J. Stolfo / Denial-of-service attack / Honeypot

Baiting Inside Attackers Using Decoy Documents Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo Department of Computer Science Columbia University Abstract. The insider threat remains one of th

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
995

APRILISSUE #10 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA

Add to Reading List

Source URL: www.scotlandrussiaforum.org

Language: English - Date: 2016-03-03 11:08:49
    996Computing / Network architecture / Computer network security / OpenFlow / Cyberwarfare / OSI protocols / Transmission Control Protocol / Software-defined networking / SYN cookies / Denial-of-service attack / Data link layer / Forwarding plane

    AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

    Add to Reading List

    Source URL: faculty.cse.tamu.edu

    Language: English - Date: 2013-08-28 15:18:02
    997

    Spin versus Reality: Excepts from the Lovingier disciplinary report A Denver Safety Department disciplinary report on Denver Sheriff’s Deputy Brady Loviniger’s attack on inmate Anthony Waller found several major hole

    Add to Reading List

    Source URL: coloradoindependent.com

    Language: English - Date: 2014-02-13 12:27:30
      998

      Index account, 189 account-based issuing protocol, 189 account-less issuing protocol, 190 ACES, 4, 13, 18, 25 active attack, 46

      Add to Reading List

      Source URL: www.credentica.com

      Language: English - Date: 2004-05-24 21:00:38
        999

        Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Proving TLS-attack related open biases of RC4 Santanu Sarkar · Sourav Sen Gupta ·

        Add to Reading List

        Source URL: www.souravsengupta.com

        Language: English - Date: 2014-08-03 10:57:23
          1000

          SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. 2009; 2:83–96 Published online 24 September 2008 in Wiley InterScience (www.interscience.wiley.com) DOI: sec.58 Network risk management using attack

          Add to Reading List

          Source URL: nsl.cse.unt.edu

          Language: English - Date: 2011-12-20 17:57:32
            UPDATE