<--- Back to Details
First PageDocument Content
Computing / Concurrency control / Networking hardware / Information and communications technology / Concurrent computing / Computer networking / Computer network security / Middlebox / Monitor / Packet processing / Data Plane Development Kit / Transmission Control Protocol
Date: 2015-07-16 16:30:14
Computing
Concurrency control
Networking hardware
Information and communications technology
Concurrent computing
Computer networking
Computer network security
Middlebox
Monitor
Packet processing
Data Plane Development Kit
Transmission Control Protocol

Rollback-Recovery for Middleboxes Justine Sherry∗ Peter Xiang Gao∗ Soumya Basu∗ Aurojit Panda∗ Arvind Krishnamurthy• Christian Maciocco† Maziar Manesh† João Martins/ Sylvia Ratnasamy∗ Luigi Rizzo‡ Scot

Add to Reading List

Source URL: people.eecs.berkeley.edu

Download Document from Source Website

File Size: 984,75 KB

Share Document on Facebook

Similar Documents

A Paged Domain Name System for Query Privacy Daniele E. Asoni, Samuel Hitz, and Adrian Perrig Network Security Group Department of Computer Science, ETH Zürich {daniele.asoni,samuel.hitz,adrian.perrig}@inf.ethz.ch

A Paged Domain Name System for Query Privacy Daniele E. Asoni, Samuel Hitz, and Adrian Perrig Network Security Group Department of Computer Science, ETH Zürich {daniele.asoni,samuel.hitz,adrian.perrig}@inf.ethz.ch

DocID: 1xVqa - View Document

EECS 388 Intro to Computer Security October 14, 2016 Project 3: Network Security

EECS 388 Intro to Computer Security October 14, 2016 Project 3: Network Security

DocID: 1xUDb - View Document

Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

DocID: 1v7im - View Document

Managing Computer Security Incident Response Teams (CSIRTs)  “Can you business survive and recover from network attacks and intruder threats?”

Managing Computer Security Incident Response Teams (CSIRTs) “Can you business survive and recover from network attacks and intruder threats?”

DocID: 1uOLO - View Document

Causality-based Sensemaking of Network Traffic for Android Application Security∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danf

Causality-based Sensemaking of Network Traffic for Android Application Security∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danf

DocID: 1uMv5 - View Document